SUSE update for the Linux Kernel



| Updated: 2025-03-03
Risk Low
Patch available YES
Number of vulnerabilities 54
CVE-ID CVE-2021-47222
CVE-2021-47223
CVE-2024-26644
CVE-2024-47809
CVE-2024-48881
CVE-2024-49948
CVE-2024-50142
CVE-2024-52332
CVE-2024-53155
CVE-2024-53185
CVE-2024-53197
CVE-2024-53227
CVE-2024-55916
CVE-2024-56369
CVE-2024-56532
CVE-2024-56533
CVE-2024-56539
CVE-2024-56574
CVE-2024-56593
CVE-2024-56594
CVE-2024-56600
CVE-2024-56601
CVE-2024-56615
CVE-2024-56623
CVE-2024-56630
CVE-2024-56637
CVE-2024-56641
CVE-2024-56643
CVE-2024-56650
CVE-2024-56661
CVE-2024-56662
CVE-2024-56681
CVE-2024-56700
CVE-2024-56722
CVE-2024-56739
CVE-2024-56747
CVE-2024-56748
CVE-2024-56759
CVE-2024-56763
CVE-2024-56769
CVE-2024-57884
CVE-2024-57890
CVE-2024-57896
CVE-2024-57899
CVE-2024-57903
CVE-2024-57922
CVE-2024-57929
CVE-2024-57931
CVE-2024-57932
CVE-2024-57938
CVE-2025-21653
CVE-2025-21664
CVE-2025-21678
CVE-2025-21682
CWE-ID CWE-191
CWE-476
CWE-667
CWE-20
CWE-399
CWE-908
CWE-416
CWE-787
CWE-369
CWE-119
CWE-125
CWE-388
CWE-362
CWE-401
CWE-190
CWE-617
CWE-269
Exploitation vector Local
Public exploit Vulnerability #11 is being exploited in the wild.
Vulnerable software
SUSE Linux Enterprise Server 12 SP5 LTSS Extended
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12 SP5
Operating systems & Components / Operating system

SUSE Linux Enterprise High Availability Extension 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

kernel-default-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-man
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-macros
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

gfs2-kmp-default
Operating systems & Components / Operating system package or component

gfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-base-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-default
Operating systems & Components / Operating system package or component

ocfs2-kmp-default
Operating systems & Components / Operating system package or component

kernel-syms
Operating systems & Components / Operating system package or component

kernel-default-devel
Operating systems & Components / Operating system package or component

kernel-default-base
Operating systems & Components / Operating system package or component

cluster-md-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-default
Operating systems & Components / Operating system package or component

dlm-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-kgraft
Operating systems & Components / Operating system package or component

kernel-default-kgraft-devel
Operating systems & Components / Operating system package or component

kgraft-patch-4_12_14-122_247-default
Operating systems & Components / Operating system package or component

kernel-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-debugsource
Operating systems & Components / Operating system package or component

kernel-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 54 vulnerabilities.

1) Integer underflow

EUVDB-ID: #VU91666

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47222

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the br_handle_egress_vlan_tunnel() function in net/bridge/br_vlan_tunnel.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU90464

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47223

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the br_vlan_tunnel_lookup(), __vlan_tunnel_info_add(), br_handle_ingress_vlan_tunnel() and br_handle_egress_vlan_tunnel() functions in net/bridge/br_vlan_tunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU91535

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26644

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the create_snapshot() function in fs/btrfs/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU102925

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47809

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the validate_lock_args() function in fs/dlm/lock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) NULL pointer dereference

EUVDB-ID: #VU102927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-48881

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cache_set_flush() function in drivers/md/bcache/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU99042

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49948

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qdisc_pkt_len_init() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU100081

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50142

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the verify_newsa_info() function in net/xfrm/xfrm_user.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Resource management error

EUVDB-ID: #VU102974

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-52332

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the igb_init_module() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Use of uninitialized resource

EUVDB-ID: #VU101917

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53155

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ocfs2_file_write_iter() and ocfs2_file_read_iter() functions in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU102051

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53185

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Out-of-bounds write

EUVDB-ID: #VU102090

Risk: High

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2024-53197

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to compromise the affected system.

The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.

Note, the vulnerability is being actively exploited against Android devices.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

12) Use-after-free

EUVDB-ID: #VU102067

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53227

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bfad_init() function in drivers/scsi/bfa/bfad.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) NULL pointer dereference

EUVDB-ID: #VU102929

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-55916

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the util_probe() function in drivers/hv/hv_util.c, within the hv_vss_init() function in drivers/hv/hv_snapshot.c, within the hv_kvp_init() function in drivers/hv/hv_kvp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Division by zero

EUVDB-ID: #VU102970

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56369

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the EXPORT_SYMBOL() and drm_mode_vrefresh() functions in drivers/gpu/drm/drm_modes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU102181

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56532

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_us122l_disconnect() function in sound/usb/usx2y/us122l.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper locking

EUVDB-ID: #VU102182

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56533

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_usx2y_disconnect() function in sound/usb/usx2y/usbusx2y.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Buffer overflow

EUVDB-ID: #VU102236

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56539

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) NULL pointer dereference

EUVDB-ID: #VU102125

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56574

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ts2020_regmap_unlock() function in drivers/media/dvb-frontends/ts2020.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) NULL pointer dereference

EUVDB-ID: #VU102107

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56593

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brcmf_sdiod_sgtable_alloc() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/bcmsdh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Improper locking

EUVDB-ID: #VU102160

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56594

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the amdgpu_ttm_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU102016

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56600

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the htons() function in net/ipv6/af_inet6.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Use-after-free

EUVDB-ID: #VU102015

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56601

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the htons() function in net/ipv4/af_inet.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Out-of-bounds read

EUVDB-ID: #VU102083

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56615

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dev_map_alloc(), dev_map_delete_elem() and dev_map_hash_delete_elem() functions in kernel/bpf/devmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU102023

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56623

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper error handling

EUVDB-ID: #VU102203

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56630

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ocfs2_get_init_inode() function in fs/ocfs2/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Race condition

EUVDB-ID: #VU102219

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56637

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the find_set_type() function in net/netfilter/ipset/ip_set_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Resource management error

EUVDB-ID: #VU102228

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56641

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Memory leak

EUVDB-ID: #VU101989

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56643

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dccp_feat_change_recv() function in net/dccp/feat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Out-of-bounds read

EUVDB-ID: #VU102078

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56650

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the led_tg_check() function in net/netfilter/xt_LED.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) NULL pointer dereference

EUVDB-ID: #VU102119

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56661

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Out-of-bounds read

EUVDB-ID: #VU102077

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56662

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Improper error handling

EUVDB-ID: #VU102198

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56681

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ahash_hmac_setkey() and ahash_hmac_init() functions in drivers/crypto/bcm/cipher.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) NULL pointer dereference

EUVDB-ID: #VU102102

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56700

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fmc_send_cmd() function in drivers/media/radio/wl128x/fmdrv_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Input validation error

EUVDB-ID: #VU102268

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56722

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the free_srqc() function in drivers/infiniband/hw/hns/hns_roce_srq.c, within the hns_roce_mr_free() function in drivers/infiniband/hw/hns/hns_roce_mr.c, within the set_rwqe_data_seg(), free_mr_modify_rsv_qp(), free_mr_post_send_lp_wqe(), free_mr_send_cmd_to_hw(), hns_roce_v2_set_abs_fields(), hns_roce_v2_modify_qp(), hns_roce_v2_query_qp(), hns_roce_v2_destroy_qp_common(), hns_roce_v2_destroy_qp(), hns_roce_v2_modify_cq() and hns_roce_v2_query_cqc() functions in drivers/infiniband/hw/hns/hns_roce_hw_v2.c, within the hns_roce_table_put() function in drivers/infiniband/hw/hns/hns_roce_hem.c, within the free_cqc() function in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Improper locking

EUVDB-ID: #VU102154

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56739

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rtc_timer_do_work() function in drivers/rtc/interface.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Memory leak

EUVDB-ID: #VU101980

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56747

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qedi_alloc_and_init_sb() function in drivers/scsi/qedi/qedi_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Memory leak

EUVDB-ID: #VU101979

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56748

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qedf_alloc_and_init_sb() function in drivers/scsi/qedf/qedf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Use-after-free

EUVDB-ID: #VU102393

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56759

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Resource management error

EUVDB-ID: #VU102404

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56763

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tracing_cpumask_write() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Improper error handling

EUVDB-ID: #VU102401

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56769

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the MODULE_PARM_DESC() function in drivers/media/dvb-frontends/dib3000mb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use-after-free

EUVDB-ID: #VU102909

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57884

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zone_reclaimable_pages() function in mm/vmscan.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Integer overflow

EUVDB-ID: #VU102963

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57890

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the uverbs_request_next_ptr(), ib_uverbs_post_send() and ib_uverbs_unmarshall_recv() functions in drivers/infiniband/core/uverbs_cmd.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Use-after-free

EUVDB-ID: #VU102904

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57896

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Integer overflow

EUVDB-ID: #VU102964

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57899

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the ieee80211_mbss_info_change_notify() function in net/mac80211/mesh.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Improper locking

EUVDB-ID: #VU102931

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57903

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sk_setsockopt() function in net/core/sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Reachable assertion

EUVDB-ID: #VU103037

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57922

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the drivers/gpu/drm/amd/display/dc/dml/dml_inline_defs.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) NULL pointer dereference

EUVDB-ID: #VU103021

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57929

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the load_ablock() function in drivers/md/persistent-data/dm-array.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Improper privilege management

EUVDB-ID: #VU103139

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57931

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the services_compute_xperms_decision() function in security/selinux/ss/services.c. A local user can read and manipulate data.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) NULL pointer dereference

EUVDB-ID: #VU103123

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57932

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gve_xdp_xmit() function in drivers/net/ethernet/google/gve/gve_tx.c, within the gve_turndown() function in drivers/net/ethernet/google/gve/gve_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Integer overflow

EUVDB-ID: #VU103133

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57938

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the sctp_association_init() function in net/sctp/associola.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Out-of-bounds read

EUVDB-ID: #VU103016

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21653

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the NLA_POLICY_MAX() function in net/sched/cls_flow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Out-of-bounds read

EUVDB-ID: #VU103120

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21664

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the get_first_thin() function in drivers/md/dm-thin.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Improper locking

EUVDB-ID: #VU103590

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21678

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the gtp_newlink() and gtp_net_exit_batch_rtnl() functions in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) NULL pointer dereference

EUVDB-ID: #VU103587

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21682

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the bnxt_xdp_set() function in drivers/net/ethernet/broadcom/bnxt/bnxt_xdp.c, within the bnxt_set_ring_params(), bnxt_set_rx_skb_mode() and bnxt_init_one() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.247.1

kernel-default-man: before 4.12.14-122.247.1

kernel-devel: before 4.12.14-122.247.1

kernel-macros: before 4.12.14-122.247.1

kernel-source: before 4.12.14-122.247.1

gfs2-kmp-default: before 4.12.14-122.247.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-base-debuginfo: before 4.12.14-122.247.1

cluster-md-kmp-default: before 4.12.14-122.247.1

ocfs2-kmp-default: before 4.12.14-122.247.1

kernel-syms: before 4.12.14-122.247.1

kernel-default-devel: before 4.12.14-122.247.1

kernel-default-base: before 4.12.14-122.247.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1

dlm-kmp-default: before 4.12.14-122.247.1

dlm-kmp-default-debuginfo: before 4.12.14-122.247.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1

kernel-default-kgraft: before 4.12.14-122.247.1

kernel-default-kgraft-devel: before 4.12.14-122.247.1

kgraft-patch-4_12_14-122_247-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.247.1

kernel-default-debugsource: before 4.12.14-122.247.1

kernel-default: before 4.12.14-122.247.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###