Risk | Low |
Patch available | YES |
Number of vulnerabilities | 54 |
CVE-ID | CVE-2021-47222 CVE-2021-47223 CVE-2024-26644 CVE-2024-47809 CVE-2024-48881 CVE-2024-49948 CVE-2024-50142 CVE-2024-52332 CVE-2024-53155 CVE-2024-53185 CVE-2024-53197 CVE-2024-53227 CVE-2024-55916 CVE-2024-56369 CVE-2024-56532 CVE-2024-56533 CVE-2024-56539 CVE-2024-56574 CVE-2024-56593 CVE-2024-56594 CVE-2024-56600 CVE-2024-56601 CVE-2024-56615 CVE-2024-56623 CVE-2024-56630 CVE-2024-56637 CVE-2024-56641 CVE-2024-56643 CVE-2024-56650 CVE-2024-56661 CVE-2024-56662 CVE-2024-56681 CVE-2024-56700 CVE-2024-56722 CVE-2024-56739 CVE-2024-56747 CVE-2024-56748 CVE-2024-56759 CVE-2024-56763 CVE-2024-56769 CVE-2024-57884 CVE-2024-57890 CVE-2024-57896 CVE-2024-57899 CVE-2024-57903 CVE-2024-57922 CVE-2024-57929 CVE-2024-57931 CVE-2024-57932 CVE-2024-57938 CVE-2025-21653 CVE-2025-21664 CVE-2025-21678 CVE-2025-21682 |
CWE-ID | CWE-191 CWE-476 CWE-667 CWE-20 CWE-399 CWE-908 CWE-416 CWE-787 CWE-369 CWE-119 CWE-125 CWE-388 CWE-362 CWE-401 CWE-190 CWE-617 CWE-269 |
Exploitation vector | Local |
Public exploit | Vulnerability #11 is being exploited in the wild. |
Vulnerable software |
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise High Availability Extension 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component kernel-default-man Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-base-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-kgraft Operating systems & Components / Operating system package or component kernel-default-kgraft-devel Operating systems & Components / Operating system package or component kgraft-patch-4_12_14-122_247-default Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 54 vulnerabilities.
EUVDB-ID: #VU91666
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47222
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the br_handle_egress_vlan_tunnel() function in net/bridge/br_vlan_tunnel.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90464
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47223
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the br_vlan_tunnel_lookup(), __vlan_tunnel_info_add(), br_handle_ingress_vlan_tunnel() and br_handle_egress_vlan_tunnel() functions in net/bridge/br_vlan_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91535
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26644
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the create_snapshot() function in fs/btrfs/ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102925
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47809
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the validate_lock_args() function in fs/dlm/lock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-48881
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cache_set_flush() function in drivers/md/bcache/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99042
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49948
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qdisc_pkt_len_init() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100081
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50142
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the verify_newsa_info() function in net/xfrm/xfrm_user.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102974
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-52332
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the igb_init_module() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101917
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53155
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ocfs2_file_write_iter() and ocfs2_file_read_iter() functions in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102051
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53185
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102090
Risk: High
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53197
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the affected system.
The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited against Android devices.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU102067
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53227
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfad_init() function in drivers/scsi/bfa/bfad.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-55916
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the util_probe() function in drivers/hv/hv_util.c, within the hv_vss_init() function in drivers/hv/hv_snapshot.c, within the hv_kvp_init() function in drivers/hv/hv_kvp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102970
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56369
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the EXPORT_SYMBOL() and drm_mode_vrefresh() functions in drivers/gpu/drm/drm_modes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102181
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56532
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_us122l_disconnect() function in sound/usb/usx2y/us122l.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102182
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56533
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_usx2y_disconnect() function in sound/usb/usx2y/usbusx2y.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56539
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102125
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56574
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ts2020_regmap_unlock() function in drivers/media/dvb-frontends/ts2020.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102107
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56593
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcmf_sdiod_sgtable_alloc() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/bcmsdh.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56594
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the amdgpu_ttm_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102016
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56600
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the htons() function in net/ipv6/af_inet6.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102015
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56601
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the htons() function in net/ipv4/af_inet.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102083
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56615
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dev_map_alloc(), dev_map_delete_elem() and dev_map_hash_delete_elem() functions in kernel/bpf/devmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102023
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56623
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qla2x00_do_dpc() function in drivers/scsi/qla2xxx/qla_os.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56630
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ocfs2_get_init_inode() function in fs/ocfs2/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102219
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56637
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the find_set_type() function in net/netfilter/ipset/ip_set_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102228
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56641
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101989
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56643
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dccp_feat_change_recv() function in net/dccp/feat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56650
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the led_tg_check() function in net/netfilter/xt_LED.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102119
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56661
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cleanup_bearer() function in net/tipc/udp_media.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56662
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102198
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56681
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ahash_hmac_setkey() and ahash_hmac_init() functions in drivers/crypto/bcm/cipher.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102102
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56700
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fmc_send_cmd() function in drivers/media/radio/wl128x/fmdrv_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102268
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56722
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the free_srqc() function in drivers/infiniband/hw/hns/hns_roce_srq.c, within the hns_roce_mr_free() function in drivers/infiniband/hw/hns/hns_roce_mr.c, within the set_rwqe_data_seg(), free_mr_modify_rsv_qp(), free_mr_post_send_lp_wqe(), free_mr_send_cmd_to_hw(), hns_roce_v2_set_abs_fields(), hns_roce_v2_modify_qp(), hns_roce_v2_query_qp(), hns_roce_v2_destroy_qp_common(), hns_roce_v2_destroy_qp(), hns_roce_v2_modify_cq() and hns_roce_v2_query_cqc() functions in drivers/infiniband/hw/hns/hns_roce_hw_v2.c, within the hns_roce_table_put() function in drivers/infiniband/hw/hns/hns_roce_hem.c, within the free_cqc() function in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56739
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtc_timer_do_work() function in drivers/rtc/interface.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56747
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qedi_alloc_and_init_sb() function in drivers/scsi/qedi/qedi_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101979
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56748
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qedf_alloc_and_init_sb() function in drivers/scsi/qedf/qedf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102393
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56759
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_force_cow_block() and btrfs_cow_block() functions in fs/btrfs/ctree.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102404
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56763
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tracing_cpumask_write() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102401
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56769
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the MODULE_PARM_DESC() function in drivers/media/dvb-frontends/dib3000mb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102909
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zone_reclaimable_pages() function in mm/vmscan.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102963
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57890
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the uverbs_request_next_ptr(), ib_uverbs_post_send() and ib_uverbs_unmarshall_recv() functions in drivers/infiniband/core/uverbs_cmd.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102904
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57896
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102964
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57899
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the ieee80211_mbss_info_change_notify() function in net/mac80211/mesh.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102931
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57903
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sk_setsockopt() function in net/core/sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57922
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the drivers/gpu/drm/amd/display/dc/dml/dml_inline_defs.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57929
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the load_ablock() function in drivers/md/persistent-data/dm-array.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103139
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57931
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
The vulnerability exists due to improperly imposed permissions within the services_compute_xperms_decision() function in security/selinux/ss/services.c. A local user can read and manipulate data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103123
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57932
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gve_xdp_xmit() function in drivers/net/ethernet/google/gve/gve_tx.c, within the gve_turndown() function in drivers/net/ethernet/google/gve/gve_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103133
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57938
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the sctp_association_init() function in net/sctp/associola.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21653
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the NLA_POLICY_MAX() function in net/sched/cls_flow.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103120
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21664
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_first_thin() function in drivers/md/dm-thin.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103590
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21678
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the gtp_newlink() and gtp_net_exit_batch_rtnl() functions in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103587
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21682
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bnxt_xdp_set() function in drivers/net/ethernet/broadcom/bnxt/bnxt_xdp.c, within the bnxt_set_ring_params(), bnxt_set_rx_skb_mode() and bnxt_init_one() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.247.1
kernel-default-man: before 4.12.14-122.247.1
kernel-devel: before 4.12.14-122.247.1
kernel-macros: before 4.12.14-122.247.1
kernel-source: before 4.12.14-122.247.1
gfs2-kmp-default: before 4.12.14-122.247.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-base-debuginfo: before 4.12.14-122.247.1
cluster-md-kmp-default: before 4.12.14-122.247.1
ocfs2-kmp-default: before 4.12.14-122.247.1
kernel-syms: before 4.12.14-122.247.1
kernel-default-devel: before 4.12.14-122.247.1
kernel-default-base: before 4.12.14-122.247.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.247.1
dlm-kmp-default: before 4.12.14-122.247.1
dlm-kmp-default-debuginfo: before 4.12.14-122.247.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.247.1
kernel-default-kgraft: before 4.12.14-122.247.1
kernel-default-kgraft-devel: before 4.12.14-122.247.1
kgraft-patch-4_12_14-122_247-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.247.1
kernel-default-debugsource: before 4.12.14-122.247.1
kernel-default: before 4.12.14-122.247.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250565-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.