Risk | Low |
Patch available | YES |
Number of vulnerabilities | 189 |
CVE-ID | CVE-2023-52831 CVE-2023-52926 CVE-2023-52927 CVE-2024-26634 CVE-2024-26873 CVE-2024-35826 CVE-2024-35910 CVE-2024-38606 CVE-2024-41005 CVE-2024-41077 CVE-2024-41149 CVE-2024-42307 CVE-2024-43820 CVE-2024-46736 CVE-2024-46782 CVE-2024-46796 CVE-2024-47408 CVE-2024-47794 CVE-2024-49571 CVE-2024-49924 CVE-2024-49940 CVE-2024-49994 CVE-2024-50056 CVE-2024-50126 CVE-2024-50140 CVE-2024-50152 CVE-2024-50290 CVE-2024-52559 CVE-2024-53057 CVE-2024-53063 CVE-2024-53140 CVE-2024-53163 CVE-2024-53680 CVE-2024-54683 CVE-2024-56638 CVE-2024-56640 CVE-2024-56702 CVE-2024-56703 CVE-2024-56718 CVE-2024-56719 CVE-2024-56751 CVE-2024-56758 CVE-2024-56770 CVE-2024-57807 CVE-2024-57834 CVE-2024-57900 CVE-2024-57947 CVE-2024-57973 CVE-2024-57974 CVE-2024-57978 CVE-2024-57979 CVE-2024-57980 CVE-2024-57981 CVE-2024-57986 CVE-2024-57990 CVE-2024-57993 CVE-2024-57996 CVE-2024-57997 CVE-2024-57999 CVE-2024-58002 CVE-2024-58005 CVE-2024-58006 CVE-2024-58007 CVE-2024-58009 CVE-2024-58011 CVE-2024-58012 CVE-2024-58013 CVE-2024-58014 CVE-2024-58017 CVE-2024-58019 CVE-2024-58020 CVE-2024-58034 CVE-2024-58051 CVE-2024-58052 CVE-2024-58054 CVE-2024-58055 CVE-2024-58056 CVE-2024-58057 CVE-2024-58058 CVE-2024-58061 CVE-2024-58063 CVE-2024-58069 CVE-2024-58072 CVE-2024-58076 CVE-2024-58078 CVE-2024-58079 CVE-2024-58080 CVE-2024-58083 CVE-2024-58085 CVE-2024-58086 CVE-2025-21631 CVE-2025-21635 CVE-2025-21659 CVE-2025-21671 CVE-2025-21693 CVE-2025-21701 CVE-2025-21703 CVE-2025-21704 CVE-2025-21706 CVE-2025-21708 CVE-2025-21711 CVE-2025-21714 CVE-2025-21718 CVE-2025-21723 CVE-2025-21726 CVE-2025-21727 CVE-2025-21731 CVE-2025-21732 CVE-2025-21733 CVE-2025-21734 CVE-2025-21735 CVE-2025-21736 CVE-2025-21738 CVE-2025-21739 CVE-2025-21741 CVE-2025-21742 CVE-2025-21743 CVE-2025-21744 CVE-2025-21745 CVE-2025-21749 CVE-2025-21750 CVE-2025-21753 CVE-2025-21754 CVE-2025-21756 CVE-2025-21759 CVE-2025-21760 CVE-2025-21761 CVE-2025-21762 CVE-2025-21763 CVE-2025-21764 CVE-2025-21765 CVE-2025-21766 CVE-2025-21772 CVE-2025-21773 CVE-2025-21775 CVE-2025-21776 CVE-2025-21779 CVE-2025-21780 CVE-2025-21781 CVE-2025-21782 CVE-2025-21784 CVE-2025-21785 CVE-2025-21791 CVE-2025-21793 CVE-2025-21794 CVE-2025-21796 CVE-2025-21804 CVE-2025-21810 CVE-2025-21815 CVE-2025-21819 CVE-2025-21820 CVE-2025-21821 CVE-2025-21823 CVE-2025-21825 CVE-2025-21828 CVE-2025-21829 CVE-2025-21830 CVE-2025-21831 CVE-2025-21832 CVE-2025-21835 CVE-2025-21838 CVE-2025-21844 CVE-2025-21846 CVE-2025-21847 CVE-2025-21848 CVE-2025-21850 CVE-2025-21855 CVE-2025-21856 CVE-2025-21857 CVE-2025-21858 CVE-2025-21859 CVE-2025-21861 CVE-2025-21862 CVE-2025-21864 CVE-2025-21865 CVE-2025-21866 CVE-2025-21869 CVE-2025-21870 CVE-2025-21871 CVE-2025-21876 CVE-2025-21877 CVE-2025-21878 CVE-2025-21883 CVE-2025-21885 CVE-2025-21886 CVE-2025-21888 CVE-2025-21890 CVE-2025-21891 CVE-2025-21892 |
CWE-ID | CWE-388 CWE-416 CWE-20 CWE-667 CWE-682 CWE-125 CWE-476 CWE-399 CWE-835 CWE-190 CWE-191 CWE-415 CWE-193 CWE-401 CWE-908 CWE-362 CWE-119 CWE-617 CWE-369 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
SUSE Real Time Module Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-6_4_0-150600_10_34-rt Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource Operating systems & Components / Operating system package or component kernel-rt Operating systems & Components / Operating system package or component kernel-rt_debug Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component kernel-syms-rt Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 189 vulnerabilities.
EUVDB-ID: #VU90934
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52831
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the cpu_down_maps_locked() function in kernel/cpu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104163
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52926
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the io_rw_init_file() function in io_uring/rw.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105746
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52927
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nft_ct_set_zone_eval() and nft_ct_tmpl_alloc_pcpu() functions in net/netfilter/nft_ct.c, within the EXPORT_SYMBOL_GPL() and nf_ct_find_expectation() functions in net/netfilter/nf_conntrack_expect.c, within the init_conntrack() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93655
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26634
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the default_device_exit_net() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90781
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26873
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hisi_sas_internal_abort_timeout() function in drivers/scsi/hisi_sas/hisi_sas_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93757
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35826
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the __bio_release_pages() function in block/bio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92021
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35910
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tcp_close() function in net/ipv4/tcp.c, within the inet_csk_clear_xmit_timers() function in net/ipv4/inet_connection_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93402
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38606
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the validate_tl_data() and adf_tl_run() functions in drivers/crypto/intel/qat/qat_common/adf_telemetry.c, within the adf_gen4_init_tl_data() function in drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94264
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41005
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the netpoll_owner_active() function in net/core/netpoll.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41077
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the null_validate_conf() function in drivers/block/null_blk/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102914
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41149
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the blk_mq_alloc_disk_for_queue() and blk_mq_alloc_and_init_hctx() functions in block/blk-mq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42307
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the init_cifs(), destroy_mids() and destroy_workqueue() functions in fs/smb/client/cifsfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-43820
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the raid_resume() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97570
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46736
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the smb2_rename_path() function in fs/smb/client/smb2inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97496
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46782
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ila_xlat_init_net() and ila_xlat_exit_net() functions in net/ipv6/ila/ila_xlat.c, within the ila_pre_exit_net() and ila_exit_net() functions in net/ipv6/ila/ila_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97499
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46796
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_set_path_size() function in fs/smb/client/smb2inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102950
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47408
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the smc_find_ism_v2_device_serv() function in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102971
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47794
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the bpf_attach_type_to_tramp(), __bpf_trampoline_link_prog(), __bpf_trampoline_unlink_prog(), bpf_shim_tramp_link_release() and bpf_trampoline_link_cgroup_shim() functions in kernel/bpf/trampoline.c, within the bpf_tracing_link_release() and bpf_tracing_prog_attach() functions in kernel/bpf/syscall.c, within the bpf_prog_alloc_no_stats() function in kernel/bpf/core.c, within the prog_fd_array_get_ptr() function in kernel/bpf/arraymap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102952
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49571
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the smc_clc_msg_prop_valid() function in net/smc/smc_clc.c, within the smc_listen_prfx_check() and smc_find_ism_v1_device_serv() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98870
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49924
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pxafb_remove() function in drivers/video/fbdev/pxafb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49940
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pppol2tp_session_setsockopt() function in net/l2tp/l2tp_ppp.c, within the l2tp_nl_cmd_session_modify() function in net/l2tp/l2tp_netlink.c, within the l2tp_v3_session_get(), l2tp_session_register(), l2tp_recv_common(), EXPORT_SYMBOL_GPL(), l2tp_session_set_header_len() and l2tp_session_create() functions in net/l2tp/l2tp_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99092
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49994
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the blk_ioctl_discard() and blk_ioctl_secure_erase() functions in block/ioctl.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50056
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the find_format_by_pix(), uvc_v4l2_try_format() and uvc_v4l2_enum_format() functions in drivers/usb/gadget/function/uvc_v4l2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99807
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50126
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the taprio_dump() function in net/sched/sch_taprio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100076
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50140
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the task_work_add() function in kernel/task_work.c, within the task_tick_mm_cid() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100060
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50152
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smb2_set_ea() function in fs/smb/client/smb2ops.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100637
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50290
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the cx24116_read_snr_pct() function in drivers/media/dvb-frontends/cx24116.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105046
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-52559
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the msm_ioctl_gem_submit() function in drivers/gpu/drm/msm/msm_gem_submit.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100707
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100741
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53063
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DECLARE_RWSEM() and dvb_register_device() functions in drivers/media/dvb-core/dvbdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101230
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53140
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the netlink_skb_set_owner_r(), netlink_sock_destruct(), deferred_put_nlk_sk() and netlink_release() functions in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101919
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53163
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the uof_get_name() function in drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53680
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ip_vs_protocol_net_cleanup() and ip_vs_protocol_init() functions in net/netfilter/ipvs/ip_vs_proto.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102937
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54683
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the idletimer_tg_destroy() and idletimer_tg_destroy_v1() functions in net/netfilter/xt_IDLETIMER.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102185
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56638
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nft_inner_parse() and nft_inner_parse_needed() functions in net/netfilter/nft_inner.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102027
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56640
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the smc_listen_out() and smc_listen_work() functions in net/smc/af_smc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56702
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the SEC() function in tools/testing/selftests/bpf/progs/test_tp_btf_nullable.c, within the reg_btf_record(), check_ptr_to_btf_access(), check_mem_access(), check_func_arg(), btf_check_func_arg_match(), check_kfunc_args(), sanitize_check_bounds(), adjust_ptr_min_max_vals() and convert_ctx_accesses() functions in kernel/bpf/verifier.c, within the btf_ctx_access() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102159
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56703
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the |() function in tools/testing/selftests/net/ipv6_route_update_soft_lockup.sh, within the fib6_select_path(), ip6_route_mpath_notify(), rt6_nlmsg_size(), rt6_fill_node() and inet6_rt_notify() functions in net/ipv6/route.c, within the fib6_del_route() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102191
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56718
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the smcr_link_down_cond_sched() and smc_link_down_work() functions in net/smc/smc_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102009
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56719
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the stmmac_tso_xmit() function in drivers/net/ethernet/stmicro/stmmac/stmmac_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56751
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip6_dst_ifdown(), DEFINE_SPINLOCK() and rt6_remove_exception() functions in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102398
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56758
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the relocate_one_folio() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102490
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56770
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tfifo_reset(), tfifo_enqueue(), netem_enqueue() and netem_dequeue() functions in net/sched/sch_netem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102938
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57807
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the megasas_aen_polling() function in drivers/scsi/megaraid/megaraid_sas_base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105002
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57834
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vidtv_start_streaming() and vidtv_stop_streaming() functions in drivers/media/test-drivers/vidtv/vidtv_bridge.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102903
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57900
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the DEFINE_MUTEX() and ila_add_mapping() functions in net/ipv6/ila/ila_xlat.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_pipapo_avx2_lookup_slow() function in net/netfilter/nft_set_pipapo_avx2.c, within the nft_pipapo_lookup() and pipapo_get() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105052
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57973
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the copy_gl_to_skb_pkt() function in drivers/infiniband/hw/cxgb4/device.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105022
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57974
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the compute_score() and __udp6_lib_lookup() functions in net/ipv6/udp.c, within the udp_ehashfn() and __udp4_lib_lookup() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105017
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57978
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mxc_jpeg_detach_pm_domains() function in drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104972
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57979
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ptp_ocp_complete() function in drivers/ptp/ptp_ocp.c, within the DEFINE_MUTEX(), pps_cdev_pps_fetch(), pps_cdev_ioctl(), pps_cdev_compat_ioctl(), pps_device_destruct(), pps_register_cdev(), pps_unregister_cdev(), EXPORT_SYMBOL() and pps_init() functions in drivers/pps/pps.c, within the pps_kc_bind() and pps_kc_remove() functions in drivers/pps/kc.c, within the pps_add_offset(), pps_register_source() and pps_event() functions in drivers/pps/kapi.c, within the parport_irq() function in drivers/pps/clients/pps_parport.c, within the pps_tty_dcd_change(), pps_tty_open() and pps_tty_close() functions in drivers/pps/clients/pps-ldisc.c, within the pps_ktimer_exit() and pps_ktimer_init() functions in drivers/pps/clients/pps-ktimer.c, within the pps_gpio_probe() function in drivers/pps/clients/pps-gpio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104971
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57980
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uvc_status_init() function in drivers/media/usb/uvc/uvc_status.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105016
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57981
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xhci_handle_stopped_cmd_ring() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105014
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57986
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hid_apply_multiplier() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104986
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57990
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mt7925_load_clc() function in drivers/net/wireless/mediatek/mt76/mt7925/mcu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105078
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57993
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the thrustmaster_interrupts() function in drivers/hid/hid-thrustmaster.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57996
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sfq_change() function in net/sched/sch_sfq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105040
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57997
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the wcn36xx_probe() function in drivers/net/wireless/ath/wcn36xx/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105029
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57999
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the enable_ddw() and spapr_tce_create_table() functions in arch/powerpc/platforms/pseries/iommu.c, within the iommu_table_clear() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105071
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58002
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the uvc_v4l2_release() function in drivers/media/usb/uvc/uvc_v4l2.c, within the uvc_ctrl_send_slave_event(), uvc_ctrl_status_event(), uvc_ctrl_commit_entity() and uvc_ctrl_init_device() functions in drivers/media/usb/uvc/uvc_ctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105072
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58005
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tpm_is_tpm2_log() and tpm_read_log_acpi() functions in drivers/char/tpm/eventlog/acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105091
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58006
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dw_pcie_ep_set_bar() function in drivers/pci/controller/dwc/pcie-designware-ep.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104973
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58007
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qcom_socinfo_probe() function in drivers/soc/qcom/socinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105007
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58009
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105006
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58011
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the skl_int3472_tps68470_probe() function in drivers/platform/x86/intel/int3472/tps68470.c, within the skl_int3472_discrete_probe() function in drivers/platform/x86/intel/int3472/discrete.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105005
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58012
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sdw_params_stream() function in sound/soc/sof/intel/hda.c, within the sdw_hda_dai_hw_params() function in sound/soc/sof/intel/hda-dai.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104958
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58013
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mgmt_remove_adv_monitor_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104974
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58014
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the wlc_phy_iqcal_gainparams_nphy() function in drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_n.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105048
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58017
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the __alignof__() function in kernel/printk/printk.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105004
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58019
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the r535_gsp_msgq_wait() function in drivers/gpu/drm/nouveau/nvkm/subdev/gsp/r535.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105003
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58020
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mt_input_configured() function in drivers/hid/hid-multitouch.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105133
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58034
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tegra_emc_find_node_by_ram_code() function in drivers/memory/tegra/tegra20-emc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105410
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58051
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ipmb_probe() function in drivers/char/ipmi/ipmb_dev_int.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105409
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58052
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the atomctrl_get_smc_sclk_range_table() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/ppatomctrl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105419
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58054
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the max96712_probe() function in drivers/staging/media/max96712/max96712.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105417
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58055
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the usbg_cmd_work() and bot_cmd_work() functions in drivers/usb/gadget/function/f_tcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105427
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58056
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the rproc_alloc() function in drivers/remoteproc/remoteproc_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105428
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58057
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the idpf_probe() function in drivers/net/ethernet/intel/idpf/idpf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105392
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58058
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ubifs_dump_tnc() function in fs/ubifs/debug.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105434
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58061
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ieee80211_if_parse_active_links() function in net/mac80211/debugfs_netdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105389
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58063
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rtl_pci_probe() function in drivers/net/wireless/realtek/rtlwifi/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105395
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58069
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the pcf85063_nvmem_read() function in drivers/rtc/rtc-pcf85063.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105394
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58072
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtl_pci_get_amd_l1_patch(), _rtl_pci_find_adapter(), rtl_pci_probe(), rtl_pci_disconnect() and EXPORT_SYMBOL() functions in drivers/net/wireless/realtek/rtlwifi/pci.c, within the MODULE_AUTHOR() and rtl_core_module_init() functions in drivers/net/wireless/realtek/rtlwifi/base.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58076
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/gcc-sm6350.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105423
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58078
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the DEFINE_MUTEX() and misc_register() functions in drivers/char/misc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105390
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58079
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uvc_gpio_parse() and uvc_unregister_video() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105399
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58080
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/dispcc-sm6350.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105391
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58083
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the include/linux/kvm_host.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105422
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58085
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the tomoyo_write_control() function in security/tomoyo/common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105431
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58086
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the v3d_perfmon_destroy_ioctl() function in drivers/gpu/drm/v3d/v3d_perfmon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103011
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21631
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfq_waker_bfqq() function in block/bfq-iosched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103022
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21635
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ATOMIC_INIT(), sizeof(), rds_tcp_sysctl_reset() and rds_tcp_skbuf_handler() functions in net/rds/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103142
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21659
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the netdev_nl_napi_fill_one() and netdev_nl_napi_get_doit() functions in net/core/netdev-genl.c, within the dev_fill_forward_path() and napi_complete_done() functions in net/core/dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103511
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21671
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zram_meta_alloc() function in drivers/block/zram/zram_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103741
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21693
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zswap_pool_create(), zswap_cpu_comp_prepare(), zswap_cpu_comp_dead(), zswap_compress() and zswap_decompress() functions in mm/zswap.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103960
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104073
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21703
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104139
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21704
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the acm_process_notification() and acm_ctrl_irq() functions in drivers/usb/class/cdc-acm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105079
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21706
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mptcp_pm_nl_set_flags() function in net/mptcp/pm_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105080
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21708
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the MSR_SPEED() and rtl8150_probe() functions in drivers/net/usb/rtl8150.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105053
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21711
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the rose_setsockopt() function in net/rose/af_rose.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104965
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21714
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the destroy_unused_implicit_child_mr() and implicit_get_child_mr() functions in drivers/infiniband/hw/mlx5/odp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104963
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21718
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rose_heartbeat_expiry(), rose_timer_expiry() and rose_idletimer_expiry() functions in net/rose/rose_timer.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105011
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21723
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mpi3mr_bsg_init() function in drivers/scsi/mpi3mr/mpi3mr_app.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104961
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21726
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the padata_reorder() and invoke_padata_reorder() functions in kernel/padata.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104960
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21727
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the padata_free_shell() function in kernel/padata.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104969
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21731
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nbd_disconnect_and_put() function in drivers/block/nbd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104955
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21732
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlx5_ib_invalidate_range() function in drivers/infiniband/hw/mlx5/odp.c, within the mlx5_revoke_mr() function in drivers/infiniband/hw/mlx5/mr.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105074
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21733
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the trace_sched_migrate_callback() and register_migration_monitor() functions in kernel/trace/trace_osnoise.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104975
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21734
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the fastrpc_get_args() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105056
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21735
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the nci_hci_create_pipe() function in net/nfc/nci/hci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105049
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21736
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the nilfs_fiemap() function in fs/nilfs2/inode.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105069
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21738
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ata_pio_sector() function in drivers/ata/libata-sff.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104935
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21739
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ufshcd_pltfrm_init() and ufshcd_pltfrm_remove() functions in drivers/ufs/host/ufshcd-pltfrm.c, within the ufshcd_pci_remove() and ufshcd_pci_probe() functions in drivers/ufs/host/ufshcd-pci.c, within the EXPORT_SYMBOL_GPL(), ufshcd_set_dma_mask() and ufshcd_alloc_host() functions in drivers/ufs/core/ufshcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104977
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21741
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104978
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21742
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104979
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21743
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105000
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21744
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the brcmf_txfinalize() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104936
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21745
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the blkcg_fill_root_iostats() function in block/blk-cgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105019
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21749
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rose_bind() function in net/rose/af_rose.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21750
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the brcmf_of_probe() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/of.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104944
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21753
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/btrfs/transaction.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21754
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the btrfs_split_ordered_extent() function in fs/btrfs/ordered-data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104945
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and __vsock_release() functions in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104946
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21759
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mld_send_cr() and igmp6_send() functions in net/ipv6/mcast.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104947
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21760
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ip6_nd_hdr() and ndisc_send_skb() functions in net/ipv6/ndisc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104948
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21761
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ovs_vport_cmd_fill_info() function in net/openvswitch/datapath.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104949
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21762
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the arp_xmit_finish() function in net/ipv4/arp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104943
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21763
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __neigh_notify() function in net/core/neighbour.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104950
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21764
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ndisc_alloc_skb() function in net/ipv6/ndisc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105090
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21765
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ip6_default_advmss() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105089
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21766
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the out: kfree_skb_reason() and __ip_rt_update_pmtu() functions in net/ipv4/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104980
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21772
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mac_partition() function in block/partitions/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104998
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21773
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the es58x_devlink_info_get() function in drivers/net/can/usb/etas_es58x/es58x_devlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104996
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21775
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ctucan_err_interrupt() function in drivers/net/can/ctucanfd/ctucanfd_base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104995
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21776
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hub_probe() function in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104994
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21779
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the kvm_hv_send_ipi() and kvm_get_hv_cpuid() functions in arch/x86/kvm/hyperv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105057
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21780
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the smu_sys_set_pp_table() function in drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105077
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21781
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the batadv_v_elp_start_timer() and batadv_v_elp_get_throughput() functions in net/batman-adv/bat_v_elp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104981
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21782
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the orangefs_debug_write() function in fs/orangefs/orangefs-debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21784
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the psp_init_cap_microcode() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21785
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the populate_cache_leaves() function in arch/arm64/kernel/cacheinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104952
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21791
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the include/net/l3mdev.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105059
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21793
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the f_ospi_get_dummy_cycle() function in drivers/spi/spi-sn-f-ospi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104984
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21794
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the thrustmaster_interrupts() function in drivers/hid/hid-thrustmaster.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104953
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21796
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the posix_acl_release() function in fs/nfsd/nfs3acl.c, within the posix_acl_release() function in fs/nfsd/nfs2acl.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105159
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21804
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the rcar_pcie_parse_outbound_ranges() function in drivers/pci/controller/pcie-rcar-ep.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105140
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21810
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the class_dev_iter_init() and class_dev_iter_next() functions in drivers/base/class.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21815
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the isolate_freepages_block() function in mm/compaction.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105147
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21819
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dmub_hw_lock_mgr_inbox0_cmd() function in drivers/gpu/drm/amd/display/dc/dce/dmub_hw_lock_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21820
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cdns_uart_handle_rx(), cdns_uart_isr() and cdns_uart_console_write() functions in drivers/tty/serial/xilinx_uartps.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21821
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the omap_init_lcd_dma() function in drivers/video/fbdev/omap/lcd_dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105149
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21823
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the batadv_v_elp_start_timer(), batadv_v_elp_get_throughput(), batadv_v_elp_throughput_metric_update(), batadv_v_elp_wifi_neigh_probe() and batadv_v_elp_periodic_work() functions in net/batman-adv/bat_v_elp.c, within the batadv_v_hardif_neigh_init() function in net/batman-adv/bat_v.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105415
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21825
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bpf_timer_cancel_and_free() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105416
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21828
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the net/mac80211/driver-ops.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105424
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21829
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __rxe_cleanup() function in drivers/infiniband/sw/rxe/rxe_pool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105425
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21830
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the get_mode_access() function in security/landlock/fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105432
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21831
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the DECLARE_PCI_FIXUP_SUSPEND() function in arch/x86/pci/fixup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105429
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21832
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the blkdev_read_iter() function in block/fops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105465
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21835
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the f_midi_bind() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21838
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the usb_del_gadget() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105659
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21844
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105660
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21846
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the do_acct_process(), acct_pin_kill(), close_work(), encode_float() and fill_ac() functions in kernel/acct.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105661
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21847
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sof_ipc_msg_data() function in sound/soc/sof/stream-ipc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105662
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21848
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nfp_bpf_cmsg_alloc() function in drivers/net/ethernet/netronome/nfp/bpf/cmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105663
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21850
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nvmet_ns_enable(), nvmet_ns_disable(), nvmet_ns_free() and nvmet_ns_alloc() functions in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105652
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ibmvnic_xmit() and netif_stop_subqueue() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105653
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21856
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ism_dev_release(), ism_probe(), device_del() and ism_remove() functions in drivers/s390/net/ism_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105666
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21857
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tcf_exts_miss_cookie_base_alloc() function in net/sched/cls_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105654
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21858
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the geneve_destroy_tunnels() function in drivers/net/geneve.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105669
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21859
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the f_midi_complete() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105674
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21861
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the migrate_device_finalize() function in mm/migrate_device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105670
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21862
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the init_net_drop_monitor() and exit_net_drop_monitor() functions in net/core/drop_monitor.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105675
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21864
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tcp_add_backlog() function in net/ipv4/tcp_ipv4.c, within the tcp_ofo_queue(), tcp_queue_rcv(), tcp_data_queue() and tcp_rcv_established() functions in net/ipv4/tcp_input.c, within the tcp_fastopen_add_skb() function in net/ipv4/tcp_fastopen.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105672
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21865
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the gtp_net_exit_batch_rtnl() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105656
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21866
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the text_area_cpu_up() function in arch/powerpc/lib/code-patching.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106131
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21869
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __do_patch_instructions_mm() function in arch/powerpc/lib/code-patching.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106114
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21870
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sof_ipc4_widget_setup_comp_dai() and sof_ipc4_prepare_copier_module() functions in sound/soc/sof/ipc4-topology.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106122
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21871
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the optee_supp_thrd_req() function in drivers/tee/optee/supp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21876
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the intel_iommu_init() function in drivers/iommu/intel/iommu.c, within the enable_drhd_fault_handling() function in drivers/iommu/intel/dmar.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21877
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106117
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21878
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the npcm_i2c_probe_bus() function in drivers/i2c/busses/i2c-npcm7xx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106109
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21883
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ice_initialize_vf_entry() function in drivers/net/ethernet/intel/ice/ice_vf_lib.c, within the ice_free_vf_entries() and ice_free_vfs() functions in drivers/net/ethernet/intel/ice/ice_sriov.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106118
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21885
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106119
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21886
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the destroy_unused_implicit_child_mr() function in drivers/infiniband/hw/mlx5/odp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106111
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21888
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlx5_free_priv_descs() function in drivers/infiniband/hw/mlx5/mr.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106129
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21890
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the idpf_rx_rsc() function in drivers/net/ethernet/intel/idpf/idpf_txrx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106125
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21891
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ipvlan_addr_lookup() and ipvlan_process_v6_outbound() functions in drivers/net/ipvlan/ipvlan_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106121
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21892
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mlx5r_umr_cleanup(), mlx5r_umr_recover() and mlx5r_umr_post_send_wait() functions in drivers/infiniband/hw/mlx5/umr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug: before 6.4.0-150600.10.34.1
kernel-source-rt: before 6.4.0-150600.10.34.1
kernel-devel-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1
gfs2-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt-debugsource: before 6.4.0-150600.10.34.1
kselftests-kmp-rt: before 6.4.0-150600.10.34.1
kernel-syms-rt: before 6.4.0-150600.10.34.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-debuginfo: before 6.4.0-150600.10.34.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1
dlm-kmp-rt: before 6.4.0-150600.10.34.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt: before 6.4.0-150600.10.34.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1
kernel-rt-optional: before 6.4.0-150600.10.34.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1
kernel-rt-extra: before 6.4.0-150600.10.34.1
kernel-rt-devel: before 6.4.0-150600.10.34.1
kernel-rt-vdso: before 6.4.0-150600.10.34.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.