SUSE update for the Linux Kernel



Risk Low
Patch available YES
Number of vulnerabilities 189
CVE-ID CVE-2023-52831
CVE-2023-52926
CVE-2023-52927
CVE-2024-26634
CVE-2024-26873
CVE-2024-35826
CVE-2024-35910
CVE-2024-38606
CVE-2024-41005
CVE-2024-41077
CVE-2024-41149
CVE-2024-42307
CVE-2024-43820
CVE-2024-46736
CVE-2024-46782
CVE-2024-46796
CVE-2024-47408
CVE-2024-47794
CVE-2024-49571
CVE-2024-49924
CVE-2024-49940
CVE-2024-49994
CVE-2024-50056
CVE-2024-50126
CVE-2024-50140
CVE-2024-50152
CVE-2024-50290
CVE-2024-52559
CVE-2024-53057
CVE-2024-53063
CVE-2024-53140
CVE-2024-53163
CVE-2024-53680
CVE-2024-54683
CVE-2024-56638
CVE-2024-56640
CVE-2024-56702
CVE-2024-56703
CVE-2024-56718
CVE-2024-56719
CVE-2024-56751
CVE-2024-56758
CVE-2024-56770
CVE-2024-57807
CVE-2024-57834
CVE-2024-57900
CVE-2024-57947
CVE-2024-57973
CVE-2024-57974
CVE-2024-57978
CVE-2024-57979
CVE-2024-57980
CVE-2024-57981
CVE-2024-57986
CVE-2024-57990
CVE-2024-57993
CVE-2024-57996
CVE-2024-57997
CVE-2024-57999
CVE-2024-58002
CVE-2024-58005
CVE-2024-58006
CVE-2024-58007
CVE-2024-58009
CVE-2024-58011
CVE-2024-58012
CVE-2024-58013
CVE-2024-58014
CVE-2024-58017
CVE-2024-58019
CVE-2024-58020
CVE-2024-58034
CVE-2024-58051
CVE-2024-58052
CVE-2024-58054
CVE-2024-58055
CVE-2024-58056
CVE-2024-58057
CVE-2024-58058
CVE-2024-58061
CVE-2024-58063
CVE-2024-58069
CVE-2024-58072
CVE-2024-58076
CVE-2024-58078
CVE-2024-58079
CVE-2024-58080
CVE-2024-58083
CVE-2024-58085
CVE-2024-58086
CVE-2025-21631
CVE-2025-21635
CVE-2025-21659
CVE-2025-21671
CVE-2025-21693
CVE-2025-21701
CVE-2025-21703
CVE-2025-21704
CVE-2025-21706
CVE-2025-21708
CVE-2025-21711
CVE-2025-21714
CVE-2025-21718
CVE-2025-21723
CVE-2025-21726
CVE-2025-21727
CVE-2025-21731
CVE-2025-21732
CVE-2025-21733
CVE-2025-21734
CVE-2025-21735
CVE-2025-21736
CVE-2025-21738
CVE-2025-21739
CVE-2025-21741
CVE-2025-21742
CVE-2025-21743
CVE-2025-21744
CVE-2025-21745
CVE-2025-21749
CVE-2025-21750
CVE-2025-21753
CVE-2025-21754
CVE-2025-21756
CVE-2025-21759
CVE-2025-21760
CVE-2025-21761
CVE-2025-21762
CVE-2025-21763
CVE-2025-21764
CVE-2025-21765
CVE-2025-21766
CVE-2025-21772
CVE-2025-21773
CVE-2025-21775
CVE-2025-21776
CVE-2025-21779
CVE-2025-21780
CVE-2025-21781
CVE-2025-21782
CVE-2025-21784
CVE-2025-21785
CVE-2025-21791
CVE-2025-21793
CVE-2025-21794
CVE-2025-21796
CVE-2025-21804
CVE-2025-21810
CVE-2025-21815
CVE-2025-21819
CVE-2025-21820
CVE-2025-21821
CVE-2025-21823
CVE-2025-21825
CVE-2025-21828
CVE-2025-21829
CVE-2025-21830
CVE-2025-21831
CVE-2025-21832
CVE-2025-21835
CVE-2025-21838
CVE-2025-21844
CVE-2025-21846
CVE-2025-21847
CVE-2025-21848
CVE-2025-21850
CVE-2025-21855
CVE-2025-21856
CVE-2025-21857
CVE-2025-21858
CVE-2025-21859
CVE-2025-21861
CVE-2025-21862
CVE-2025-21864
CVE-2025-21865
CVE-2025-21866
CVE-2025-21869
CVE-2025-21870
CVE-2025-21871
CVE-2025-21876
CVE-2025-21877
CVE-2025-21878
CVE-2025-21883
CVE-2025-21885
CVE-2025-21886
CVE-2025-21888
CVE-2025-21890
CVE-2025-21891
CVE-2025-21892
CWE-ID CWE-388
CWE-416
CWE-20
CWE-667
CWE-682
CWE-125
CWE-476
CWE-399
CWE-835
CWE-190
CWE-191
CWE-415
CWE-193
CWE-401
CWE-908
CWE-362
CWE-119
CWE-617
CWE-369
Exploitation vector Local
Public exploit N/A
Vulnerable software
SUSE Real Time Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150600_10_34-rt
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 189 vulnerabilities.

1) Improper error handling

EUVDB-ID: #VU90934

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52831

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the cpu_down_maps_locked() function in kernel/cpu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU104163

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52926

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the io_rw_init_file() function in io_uring/rw.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU105746

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52927

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nft_ct_set_zone_eval() and nft_ct_tmpl_alloc_pcpu() functions in net/netfilter/nft_ct.c, within the EXPORT_SYMBOL_GPL() and nf_ct_find_expectation() functions in net/netfilter/nf_conntrack_expect.c, within the init_conntrack() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper error handling

EUVDB-ID: #VU93655

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26634

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the default_device_exit_net() function in net/core/dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU90781

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26873

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hisi_sas_internal_abort_timeout() function in drivers/scsi/hisi_sas/hisi_sas_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Incorrect calculation

EUVDB-ID: #VU93757

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35826

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the __bio_release_pages() function in block/bio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper locking

EUVDB-ID: #VU92021

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35910

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tcp_close() function in net/ipv4/tcp.c, within the inet_csk_clear_xmit_timers() function in net/ipv4/inet_connection_sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Out-of-bounds read

EUVDB-ID: #VU93402

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38606

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the validate_tl_data() and adf_tl_run() functions in drivers/crypto/intel/qat/qat_common/adf_telemetry.c, within the adf_gen4_init_tl_data() function in drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper locking

EUVDB-ID: #VU94264

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41005

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the netpoll_owner_active() function in net/core/netpoll.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU94976

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41077

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the null_validate_conf() function in drivers/block/null_blk/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU102914

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41149

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the blk_mq_alloc_disk_for_queue() and blk_mq_alloc_and_init_hctx() functions in block/blk-mq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) NULL pointer dereference

EUVDB-ID: #VU96137

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42307

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the init_cifs(), destroy_mids() and destroy_workqueue() functions in fs/smb/client/cifsfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Resource management error

EUVDB-ID: #VU96188

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43820

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the raid_resume() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Input validation error

EUVDB-ID: #VU97570

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46736

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the smb2_rename_path() function in fs/smb/client/smb2inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free

EUVDB-ID: #VU97496

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46782

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ila_xlat_init_net() and ila_xlat_exit_net() functions in net/ipv6/ila/ila_xlat.c, within the ila_pre_exit_net() and ila_exit_net() functions in net/ipv6/ila/ila_main.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Use-after-free

EUVDB-ID: #VU97499

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46796

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_set_path_size() function in fs/smb/client/smb2inode.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Input validation error

EUVDB-ID: #VU102950

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47408

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the smc_find_ism_v2_device_serv() function in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Infinite loop

EUVDB-ID: #VU102971

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47794

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the bpf_attach_type_to_tramp(), __bpf_trampoline_link_prog(), __bpf_trampoline_unlink_prog(), bpf_shim_tramp_link_release() and bpf_trampoline_link_cgroup_shim() functions in kernel/bpf/trampoline.c, within the bpf_tracing_link_release() and bpf_tracing_prog_attach() functions in kernel/bpf/syscall.c, within the bpf_prog_alloc_no_stats() function in kernel/bpf/core.c, within the prog_fd_array_get_ptr() function in kernel/bpf/arraymap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Input validation error

EUVDB-ID: #VU102952

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49571

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the smc_clc_msg_prop_valid() function in net/smc/smc_clc.c, within the smc_listen_prfx_check() and smc_find_ism_v1_device_serv() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Use-after-free

EUVDB-ID: #VU98870

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49924

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pxafb_remove() function in drivers/video/fbdev/pxafb.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) NULL pointer dereference

EUVDB-ID: #VU98956

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49940

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pppol2tp_session_setsockopt() function in net/l2tp/l2tp_ppp.c, within the l2tp_nl_cmd_session_modify() function in net/l2tp/l2tp_netlink.c, within the l2tp_v3_session_get(), l2tp_session_register(), l2tp_recv_common(), EXPORT_SYMBOL_GPL(), l2tp_session_set_header_len() and l2tp_session_create() functions in net/l2tp/l2tp_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Integer overflow

EUVDB-ID: #VU99092

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49994

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the blk_ioctl_discard() and blk_ioctl_secure_erase() functions in block/ioctl.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Input validation error

EUVDB-ID: #VU99204

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50056

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the find_format_by_pix(), uvc_v4l2_try_format() and uvc_v4l2_enum_format() functions in drivers/usb/gadget/function/uvc_v4l2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU99807

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50126

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the taprio_dump() function in net/sched/sch_taprio.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper locking

EUVDB-ID: #VU100076

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50140

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the task_work_add() function in kernel/task_work.c, within the task_tick_mm_cid() function in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use-after-free

EUVDB-ID: #VU100060

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50152

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smb2_set_ea() function in fs/smb/client/smb2ops.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Integer underflow

EUVDB-ID: #VU100637

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50290

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the cx24116_read_snr_pct() function in drivers/media/dvb-frontends/cx24116.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Integer overflow

EUVDB-ID: #VU105046

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-52559

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the msm_ioctl_gem_submit() function in drivers/gpu/drm/msm/msm_gem_submit.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Use-after-free

EUVDB-ID: #VU100707

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Resource management error

EUVDB-ID: #VU100741

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53063

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the DECLARE_RWSEM() and dvb_register_device() functions in drivers/media/dvb-core/dvbdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Double free

EUVDB-ID: #VU101230

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53140

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the netlink_skb_set_owner_r(), netlink_sock_destruct(), deferred_put_nlk_sk() and netlink_release() functions in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Off-by-one

EUVDB-ID: #VU101919

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53163

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the uof_get_name() function in drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) NULL pointer dereference

EUVDB-ID: #VU102928

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53680

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ip_vs_protocol_net_cleanup() and ip_vs_protocol_init() functions in net/netfilter/ipvs/ip_vs_proto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Improper locking

EUVDB-ID: #VU102937

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54683

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the idletimer_tg_destroy() and idletimer_tg_destroy_v1() functions in net/netfilter/xt_IDLETIMER.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Input validation error

EUVDB-ID: #VU102185

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56638

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nft_inner_parse() and nft_inner_parse_needed() functions in net/netfilter/nft_inner.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Use-after-free

EUVDB-ID: #VU102027

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56640

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the smc_listen_out() and smc_listen_work() functions in net/smc/af_smc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) NULL pointer dereference

EUVDB-ID: #VU102103

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56702

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the SEC() function in tools/testing/selftests/bpf/progs/test_tp_btf_nullable.c, within the reg_btf_record(), check_ptr_to_btf_access(), check_mem_access(), check_func_arg(), btf_check_func_arg_match(), check_kfunc_args(), sanitize_check_bounds(), adjust_ptr_min_max_vals() and convert_ctx_accesses() functions in kernel/bpf/verifier.c, within the btf_ctx_access() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Improper locking

EUVDB-ID: #VU102159

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56703

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the |() function in tools/testing/selftests/net/ipv6_route_update_soft_lockup.sh, within the fib6_select_path(), ip6_route_mpath_notify(), rt6_nlmsg_size(), rt6_fill_node() and inet6_rt_notify() functions in net/ipv6/route.c, within the fib6_del_route() function in net/ipv6/ip6_fib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Double free

EUVDB-ID: #VU102191

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56718

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the smcr_link_down_cond_sched() and smc_link_down_work() functions in net/smc/smc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Use-after-free

EUVDB-ID: #VU102009

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56719

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the stmmac_tso_xmit() function in drivers/net/ethernet/stmicro/stmmac/stmmac_main.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Improper locking

EUVDB-ID: #VU102152

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56751

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ip6_dst_ifdown(), DEFINE_SPINLOCK() and rt6_remove_exception() functions in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) NULL pointer dereference

EUVDB-ID: #VU102398

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56758

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the relocate_one_folio() function in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Resource management error

EUVDB-ID: #VU102490

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56770

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tfifo_reset(), tfifo_enqueue(), netem_enqueue() and netem_dequeue() functions in net/sched/sch_netem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Improper locking

EUVDB-ID: #VU102938

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57807

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the megasas_aen_polling() function in drivers/scsi/megaraid/megaraid_sas_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) NULL pointer dereference

EUVDB-ID: #VU105002

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57834

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vidtv_start_streaming() and vidtv_stop_streaming() functions in drivers/media/test-drivers/vidtv/vidtv_bridge.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Use-after-free

EUVDB-ID: #VU102903

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57900

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the DEFINE_MUTEX() and ila_add_mapping() functions in net/ipv6/ila/ila_xlat.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Memory leak

EUVDB-ID: #VU103269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57947

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_pipapo_avx2_lookup_slow() function in net/netfilter/nft_set_pipapo_avx2.c, within the nft_pipapo_lookup() and pipapo_get() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Integer overflow

EUVDB-ID: #VU105052

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57973

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the copy_gl_to_skb_pkt() function in drivers/infiniband/hw/cxgb4/device.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Improper locking

EUVDB-ID: #VU105022

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57974

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the compute_score() and __udp6_lib_lookup() functions in net/ipv6/udp.c, within the udp_ehashfn() and __udp4_lib_lookup() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) NULL pointer dereference

EUVDB-ID: #VU105017

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57978

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mxc_jpeg_detach_pm_domains() function in drivers/media/platform/nxp/imx-jpeg/mxc-jpeg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Use-after-free

EUVDB-ID: #VU104972

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57979

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ptp_ocp_complete() function in drivers/ptp/ptp_ocp.c, within the DEFINE_MUTEX(), pps_cdev_pps_fetch(), pps_cdev_ioctl(), pps_cdev_compat_ioctl(), pps_device_destruct(), pps_register_cdev(), pps_unregister_cdev(), EXPORT_SYMBOL() and pps_init() functions in drivers/pps/pps.c, within the pps_kc_bind() and pps_kc_remove() functions in drivers/pps/kc.c, within the pps_add_offset(), pps_register_source() and pps_event() functions in drivers/pps/kapi.c, within the parport_irq() function in drivers/pps/clients/pps_parport.c, within the pps_tty_dcd_change(), pps_tty_open() and pps_tty_close() functions in drivers/pps/clients/pps-ldisc.c, within the pps_ktimer_exit() and pps_ktimer_init() functions in drivers/pps/clients/pps-ktimer.c, within the pps_gpio_probe() function in drivers/pps/clients/pps-gpio.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Use-after-free

EUVDB-ID: #VU104971

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57980

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uvc_status_init() function in drivers/media/usb/uvc/uvc_status.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) NULL pointer dereference

EUVDB-ID: #VU105016

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57981

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xhci_handle_stopped_cmd_ring() function in drivers/usb/host/xhci-ring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) NULL pointer dereference

EUVDB-ID: #VU105014

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57986

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hid_apply_multiplier() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Out-of-bounds read

EUVDB-ID: #VU104986

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57990

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mt7925_load_clc() function in drivers/net/wireless/mediatek/mt76/mt7925/mcu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Resource management error

EUVDB-ID: #VU105078

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57993

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the thrustmaster_interrupts() function in drivers/hid/hid-thrustmaster.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Out-of-bounds read

EUVDB-ID: #VU104987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57996

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sfq_change() function in net/sched/sch_sfq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Use of uninitialized resource

EUVDB-ID: #VU105040

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57997

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the wcn36xx_probe() function in drivers/net/wireless/ath/wcn36xx/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Improper locking

EUVDB-ID: #VU105029

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57999

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the enable_ddw() and spapr_tce_create_table() functions in arch/powerpc/platforms/pseries/iommu.c, within the iommu_table_clear() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Resource management error

EUVDB-ID: #VU105071

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58002

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the uvc_v4l2_release() function in drivers/media/usb/uvc/uvc_v4l2.c, within the uvc_ctrl_send_slave_event(), uvc_ctrl_status_event(), uvc_ctrl_commit_entity() and uvc_ctrl_init_device() functions in drivers/media/usb/uvc/uvc_ctrl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Resource management error

EUVDB-ID: #VU105072

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58005

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tpm_is_tpm2_log() and tpm_read_log_acpi() functions in drivers/char/tpm/eventlog/acpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Input validation error

EUVDB-ID: #VU105091

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58006

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dw_pcie_ep_set_bar() function in drivers/pci/controller/dwc/pcie-designware-ep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Out-of-bounds read

EUVDB-ID: #VU104973

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58007

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the qcom_socinfo_probe() function in drivers/soc/qcom/socinfo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) NULL pointer dereference

EUVDB-ID: #VU105007

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58009

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) NULL pointer dereference

EUVDB-ID: #VU105006

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58011

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the skl_int3472_tps68470_probe() function in drivers/platform/x86/intel/int3472/tps68470.c, within the skl_int3472_discrete_probe() function in drivers/platform/x86/intel/int3472/discrete.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) NULL pointer dereference

EUVDB-ID: #VU105005

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58012

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sdw_params_stream() function in sound/soc/sof/intel/hda.c, within the sdw_hda_dai_hw_params() function in sound/soc/sof/intel/hda-dai.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Use-after-free

EUVDB-ID: #VU104958

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58013

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mgmt_remove_adv_monitor_complete() function in net/bluetooth/mgmt.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Out-of-bounds read

EUVDB-ID: #VU104974

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58014

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the wlc_phy_iqcal_gainparams_nphy() function in drivers/net/wireless/broadcom/brcm80211/brcmsmac/phy/phy_n.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Integer overflow

EUVDB-ID: #VU105048

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58017

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the __alignof__() function in kernel/printk/printk.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) NULL pointer dereference

EUVDB-ID: #VU105004

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58019

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the r535_gsp_msgq_wait() function in drivers/gpu/drm/nouveau/nvkm/subdev/gsp/r535.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) NULL pointer dereference

EUVDB-ID: #VU105003

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58020

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mt_input_configured() function in drivers/hid/hid-multitouch.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Use-after-free

EUVDB-ID: #VU105133

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58034

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tegra_emc_find_node_by_ram_code() function in drivers/memory/tegra/tegra20-emc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) NULL pointer dereference

EUVDB-ID: #VU105410

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58051

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ipmb_probe() function in drivers/char/ipmi/ipmb_dev_int.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) NULL pointer dereference

EUVDB-ID: #VU105409

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58052

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the atomctrl_get_smc_sclk_range_table() function in drivers/gpu/drm/amd/pm/powerplay/hwmgr/ppatomctrl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Resource management error

EUVDB-ID: #VU105419

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58054

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the max96712_probe() function in drivers/staging/media/max96712/max96712.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Double free

EUVDB-ID: #VU105417

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58055

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the usbg_cmd_work() and bot_cmd_work() functions in drivers/usb/gadget/function/f_tcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Resource management error

EUVDB-ID: #VU105427

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58056

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the rproc_alloc() function in drivers/remoteproc/remoteproc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Race condition

EUVDB-ID: #VU105428

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58057

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the idpf_probe() function in drivers/net/ethernet/intel/idpf/idpf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Use-after-free

EUVDB-ID: #VU105392

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58058

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ubifs_dump_tnc() function in fs/ubifs/debug.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Input validation error

EUVDB-ID: #VU105434

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58061

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ieee80211_if_parse_active_links() function in net/mac80211/debugfs_netdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Memory leak

EUVDB-ID: #VU105389

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58063

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the rtl_pci_probe() function in drivers/net/wireless/realtek/rtlwifi/pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Out-of-bounds read

EUVDB-ID: #VU105395

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58069

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the pcf85063_nvmem_read() function in drivers/rtc/rtc-pcf85063.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Use-after-free

EUVDB-ID: #VU105394

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58072

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rtl_pci_get_amd_l1_patch(), _rtl_pci_find_adapter(), rtl_pci_probe(), rtl_pci_disconnect() and EXPORT_SYMBOL() functions in drivers/net/wireless/realtek/rtlwifi/pci.c, within the MODULE_AUTHOR() and rtl_core_module_init() functions in drivers/net/wireless/realtek/rtlwifi/base.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) NULL pointer dereference

EUVDB-ID: #VU105400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58076

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/gcc-sm6350.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Resource management error

EUVDB-ID: #VU105423

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58078

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the DEFINE_MUTEX() and misc_register() functions in drivers/char/misc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Use-after-free

EUVDB-ID: #VU105390

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58079

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uvc_gpio_parse() and uvc_unregister_video() functions in drivers/media/usb/uvc/uvc_driver.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) NULL pointer dereference

EUVDB-ID: #VU105399

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58080

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the &() function in drivers/clk/qcom/dispcc-sm6350.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Use-after-free

EUVDB-ID: #VU105391

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58083

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the include/linux/kvm_host.h. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Buffer overflow

EUVDB-ID: #VU105422

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58085

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the tomoyo_write_control() function in security/tomoyo/common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Input validation error

EUVDB-ID: #VU105431

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58086

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the v3d_perfmon_destroy_ioctl() function in drivers/gpu/drm/v3d/v3d_perfmon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Use-after-free

EUVDB-ID: #VU103011

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21631

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bfq_waker_bfqq() function in block/bfq-iosched.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) NULL pointer dereference

EUVDB-ID: #VU103022

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21635

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ATOMIC_INIT(), sizeof(), rds_tcp_sysctl_reset() and rds_tcp_skbuf_handler() functions in net/rds/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Input validation error

EUVDB-ID: #VU103142

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21659

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the netdev_nl_napi_fill_one() and netdev_nl_napi_get_doit() functions in net/core/netdev-genl.c, within the dev_fill_forward_path() and napi_complete_done() functions in net/core/dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Use-after-free

EUVDB-ID: #VU103511

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21671

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zram_meta_alloc() function in drivers/block/zram/zram_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Use-after-free

EUVDB-ID: #VU103741

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21693

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zswap_pool_create(), zswap_cpu_comp_prepare(), zswap_cpu_comp_dead(), zswap_compress() and zswap_decompress() functions in mm/zswap.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Improper locking

EUVDB-ID: #VU103960

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21701

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Use-after-free

EUVDB-ID: #VU104073

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21703

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Buffer overflow

EUVDB-ID: #VU104139

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21704

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the acm_process_notification() and acm_ctrl_irq() functions in drivers/usb/class/cdc-acm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Resource management error

EUVDB-ID: #VU105079

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21706

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the mptcp_pm_nl_set_flags() function in net/mptcp/pm_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Resource management error

EUVDB-ID: #VU105080

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21708

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the MSR_SPEED() and rtl8150_probe() functions in drivers/net/usb/rtl8150.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Integer overflow

EUVDB-ID: #VU105053

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21711

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the rose_setsockopt() function in net/rose/af_rose.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Use-after-free

EUVDB-ID: #VU104965

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21714

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the destroy_unused_implicit_child_mr() and implicit_get_child_mr() functions in drivers/infiniband/hw/mlx5/odp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Use-after-free

EUVDB-ID: #VU104963

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21718

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the rose_heartbeat_expiry(), rose_timer_expiry() and rose_idletimer_expiry() functions in net/rose/rose_timer.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) NULL pointer dereference

EUVDB-ID: #VU105011

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21723

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mpi3mr_bsg_init() function in drivers/scsi/mpi3mr/mpi3mr_app.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Use-after-free

EUVDB-ID: #VU104961

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21726

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the padata_reorder() and invoke_padata_reorder() functions in kernel/padata.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Use-after-free

EUVDB-ID: #VU104960

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21727

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the padata_free_shell() function in kernel/padata.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Use-after-free

EUVDB-ID: #VU104969

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21731

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nbd_disconnect_and_put() function in drivers/block/nbd.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Use-after-free

EUVDB-ID: #VU104955

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21732

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5_ib_invalidate_range() function in drivers/infiniband/hw/mlx5/odp.c, within the mlx5_revoke_mr() function in drivers/infiniband/hw/mlx5/mr.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Resource management error

EUVDB-ID: #VU105074

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21733

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the trace_sched_migrate_callback() and register_migration_monitor() functions in kernel/trace/trace_osnoise.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Out-of-bounds read

EUVDB-ID: #VU104975

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21734

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the fastrpc_get_args() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Buffer overflow

EUVDB-ID: #VU105056

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21735

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the nci_hci_create_pipe() function in net/nfc/nci/hci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Integer overflow

EUVDB-ID: #VU105049

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21736

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the nilfs_fiemap() function in fs/nilfs2/inode.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Buffer overflow

EUVDB-ID: #VU105069

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21738

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ata_pio_sector() function in drivers/ata/libata-sff.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Memory leak

EUVDB-ID: #VU104935

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21739

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ufshcd_pltfrm_init() and ufshcd_pltfrm_remove() functions in drivers/ufs/host/ufshcd-pltfrm.c, within the ufshcd_pci_remove() and ufshcd_pci_probe() functions in drivers/ufs/host/ufshcd-pci.c, within the EXPORT_SYMBOL_GPL(), ufshcd_set_dma_mask() and ufshcd_alloc_host() functions in drivers/ufs/core/ufshcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Out-of-bounds read

EUVDB-ID: #VU104977

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21741

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Out-of-bounds read

EUVDB-ID: #VU104978

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21742

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Out-of-bounds read

EUVDB-ID: #VU104979

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21743

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ipheth_rcvbulk_callback_ncm() function in drivers/net/usb/ipheth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) NULL pointer dereference

EUVDB-ID: #VU105000

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21744

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the brcmf_txfinalize() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Memory leak

EUVDB-ID: #VU104936

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21745

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the blkcg_fill_root_iostats() function in block/blk-cgroup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Improper locking

EUVDB-ID: #VU105019

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21749

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rose_bind() function in net/rose/af_rose.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Input validation error

EUVDB-ID: #VU105033

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21750

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the brcmf_of_probe() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/of.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Use-after-free

EUVDB-ID: #VU104944

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21753

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fs/btrfs/transaction.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Reachable assertion

EUVDB-ID: #VU105037

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21754

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the btrfs_split_ordered_extent() function in fs/btrfs/ordered-data.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Use-after-free

EUVDB-ID: #VU104945

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21756

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and __vsock_release() functions in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Use-after-free

EUVDB-ID: #VU104946

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21759

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mld_send_cr() and igmp6_send() functions in net/ipv6/mcast.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Use-after-free

EUVDB-ID: #VU104947

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21760

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ip6_nd_hdr() and ndisc_send_skb() functions in net/ipv6/ndisc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Use-after-free

EUVDB-ID: #VU104948

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21761

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ovs_vport_cmd_fill_info() function in net/openvswitch/datapath.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Use-after-free

EUVDB-ID: #VU104949

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21762

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the arp_xmit_finish() function in net/ipv4/arp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Use-after-free

EUVDB-ID: #VU104943

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21763

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __neigh_notify() function in net/core/neighbour.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Use-after-free

EUVDB-ID: #VU104950

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21764

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ndisc_alloc_skb() function in net/ipv6/ndisc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Input validation error

EUVDB-ID: #VU105090

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21765

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ip6_default_advmss() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Input validation error

EUVDB-ID: #VU105089

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21766

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the out: kfree_skb_reason() and __ip_rt_update_pmtu() functions in net/ipv4/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Out-of-bounds read

EUVDB-ID: #VU104980

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21772

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mac_partition() function in block/partitions/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) NULL pointer dereference

EUVDB-ID: #VU104998

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21773

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the es58x_devlink_info_get() function in drivers/net/can/usb/etas_es58x/es58x_devlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) NULL pointer dereference

EUVDB-ID: #VU104996

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21775

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ctucan_err_interrupt() function in drivers/net/can/ctucanfd/ctucanfd_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) NULL pointer dereference

EUVDB-ID: #VU104995

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21776

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hub_probe() function in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) NULL pointer dereference

EUVDB-ID: #VU104994

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21779

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the kvm_hv_send_ipi() and kvm_get_hv_cpuid() functions in arch/x86/kvm/hyperv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Buffer overflow

EUVDB-ID: #VU105057

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21780

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the smu_sys_set_pp_table() function in drivers/gpu/drm/amd/pm/swsmu/amdgpu_smu.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Resource management error

EUVDB-ID: #VU105077

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21781

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the batadv_v_elp_start_timer() and batadv_v_elp_get_throughput() functions in net/batman-adv/bat_v_elp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Out-of-bounds read

EUVDB-ID: #VU104981

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21782

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the orangefs_debug_write() function in fs/orangefs/orangefs-debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Input validation error

EUVDB-ID: #VU105088

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21784

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the psp_init_cap_microcode() function in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Out-of-bounds read

EUVDB-ID: #VU104982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21785

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the populate_cache_leaves() function in arch/arm64/kernel/cacheinfo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Use-after-free

EUVDB-ID: #VU104952

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21791

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the include/net/l3mdev.h. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Division by zero

EUVDB-ID: #VU105059

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21793

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the f_ospi_get_dummy_cycle() function in drivers/spi/spi-sn-f-ospi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Out-of-bounds read

EUVDB-ID: #VU104984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21794

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the thrustmaster_interrupts() function in drivers/hid/hid-thrustmaster.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Use-after-free

EUVDB-ID: #VU104953

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21796

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the posix_acl_release() function in fs/nfsd/nfs3acl.c, within the posix_acl_release() function in fs/nfsd/nfs2acl.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Buffer overflow

EUVDB-ID: #VU105159

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21804

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rcar_pcie_parse_outbound_ranges() function in drivers/pci/controller/pcie-rcar-ep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) NULL pointer dereference

EUVDB-ID: #VU105140

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21810

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the class_dev_iter_init() and class_dev_iter_next() functions in drivers/base/class.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Out-of-bounds read

EUVDB-ID: #VU105137

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21815

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the isolate_freepages_block() function in mm/compaction.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Improper locking

EUVDB-ID: #VU105147

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21819

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dmub_hw_lock_mgr_inbox0_cmd() function in drivers/gpu/drm/amd/display/dc/dce/dmub_hw_lock_mgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Improper locking

EUVDB-ID: #VU105148

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21820

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cdns_uart_handle_rx(), cdns_uart_isr() and cdns_uart_console_write() functions in drivers/tty/serial/xilinx_uartps.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Resource management error

EUVDB-ID: #VU105158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21821

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the omap_init_lcd_dma() function in drivers/video/fbdev/omap/lcd_dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Improper locking

EUVDB-ID: #VU105149

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21823

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the batadv_v_elp_start_timer(), batadv_v_elp_get_throughput(), batadv_v_elp_throughput_metric_update(), batadv_v_elp_wifi_neigh_probe() and batadv_v_elp_periodic_work() functions in net/batman-adv/bat_v_elp.c, within the batadv_v_hardif_neigh_init() function in net/batman-adv/bat_v.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Improper locking

EUVDB-ID: #VU105415

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21825

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bpf_timer_cancel_and_free() function in kernel/bpf/helpers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Input validation error

EUVDB-ID: #VU105416

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21828

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the net/mac80211/driver-ops.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Resource management error

EUVDB-ID: #VU105424

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21829

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __rxe_cleanup() function in drivers/infiniband/sw/rxe/rxe_pool.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Resource management error

EUVDB-ID: #VU105425

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21830

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the get_mode_access() function in security/landlock/fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Input validation error

EUVDB-ID: #VU105432

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21831

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the DECLARE_PCI_FIXUP_SUSPEND() function in arch/x86/pci/fixup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) Incorrect calculation

EUVDB-ID: #VU105429

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21832

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the blkdev_read_iter() function in block/fops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Memory leak

EUVDB-ID: #VU105465

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21835

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the f_midi_bind() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Input validation error

EUVDB-ID: #VU105473

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21838

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the usb_del_gadget() function in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) NULL pointer dereference

EUVDB-ID: #VU105659

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21844

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fs/smb/client/smb2ops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) NULL pointer dereference

EUVDB-ID: #VU105660

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21846

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the do_acct_process(), acct_pin_kill(), close_work(), encode_float() and fill_ac() functions in kernel/acct.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) NULL pointer dereference

EUVDB-ID: #VU105661

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21847

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sof_ipc_msg_data() function in sound/soc/sof/stream-ipc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) NULL pointer dereference

EUVDB-ID: #VU105662

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21848

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nfp_bpf_cmsg_alloc() function in drivers/net/ethernet/netronome/nfp/bpf/cmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) NULL pointer dereference

EUVDB-ID: #VU105663

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21850

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nvmet_ns_enable(), nvmet_ns_disable(), nvmet_ns_free() and nvmet_ns_alloc() functions in drivers/nvme/target/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Use-after-free

EUVDB-ID: #VU105652

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21855

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ibmvnic_xmit() and netif_stop_subqueue() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Use-after-free

EUVDB-ID: #VU105653

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21856

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ism_dev_release(), ism_probe(), device_del() and ism_remove() functions in drivers/s390/net/ism_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) NULL pointer dereference

EUVDB-ID: #VU105666

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21857

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tcf_exts_miss_cookie_base_alloc() function in net/sched/cls_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Use-after-free

EUVDB-ID: #VU105654

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21858

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the geneve_destroy_tunnels() function in drivers/net/geneve.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Improper locking

EUVDB-ID: #VU105669

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21859

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the f_midi_complete() function in drivers/usb/gadget/function/f_midi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Resource management error

EUVDB-ID: #VU105674

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21861

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the migrate_device_finalize() function in mm/migrate_device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Improper locking

EUVDB-ID: #VU105670

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21862

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the init_net_drop_monitor() and exit_net_drop_monitor() functions in net/core/drop_monitor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Memory leak

EUVDB-ID: #VU105675

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21864

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tcp_add_backlog() function in net/ipv4/tcp_ipv4.c, within the tcp_ofo_queue(), tcp_queue_rcv(), tcp_data_queue() and tcp_rcv_established() functions in net/ipv4/tcp_input.c, within the tcp_fastopen_add_skb() function in net/ipv4/tcp_fastopen.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Improper error handling

EUVDB-ID: #VU105672

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21865

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the gtp_net_exit_batch_rtnl() function in drivers/net/gtp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Out-of-bounds read

EUVDB-ID: #VU105656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21866

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the text_area_cpu_up() function in arch/powerpc/lib/code-patching.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) Resource management error

EUVDB-ID: #VU106131

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21869

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __do_patch_instructions_mm() function in arch/powerpc/lib/code-patching.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) NULL pointer dereference

EUVDB-ID: #VU106114

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21870

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sof_ipc4_widget_setup_comp_dai() and sof_ipc4_prepare_copier_module() functions in sound/soc/sof/ipc4-topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) Improper locking

EUVDB-ID: #VU106122

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21871

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the optee_supp_thrd_req() function in drivers/tee/optee/supp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

180) Improper locking

EUVDB-ID: #VU106116

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21876

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the intel_iommu_init() function in drivers/iommu/intel/iommu.c, within the enable_drhd_fault_handling() function in drivers/iommu/intel/dmar.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

181) Resource management error

EUVDB-ID: #VU106132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21877

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the genelink_bind() function in drivers/net/usb/gl620a.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

182) Improper locking

EUVDB-ID: #VU106117

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21878

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the npcm_i2c_probe_bus() function in drivers/i2c/busses/i2c-npcm7xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

183) Use-after-free

EUVDB-ID: #VU106109

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21883

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ice_initialize_vf_entry() function in drivers/net/ethernet/intel/ice/ice_vf_lib.c, within the ice_free_vf_entries() and ice_free_vfs() functions in drivers/net/ethernet/intel/ice/ice_sriov.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

184) Improper locking

EUVDB-ID: #VU106118

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21885

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

185) Improper locking

EUVDB-ID: #VU106119

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21886

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the destroy_unused_implicit_child_mr() function in drivers/infiniband/hw/mlx5/odp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

186) Use-after-free

EUVDB-ID: #VU106111

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21888

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlx5_free_priv_descs() function in drivers/infiniband/hw/mlx5/mr.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

187) Resource management error

EUVDB-ID: #VU106129

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21890

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the idpf_rx_rsc() function in drivers/net/ethernet/intel/idpf/idpf_txrx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

188) Use of uninitialized resource

EUVDB-ID: #VU106125

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21891

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ipvlan_addr_lookup() and ipvlan_process_v6_outbound() functions in drivers/net/ipvlan/ipvlan_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

189) Improper locking

EUVDB-ID: #VU106121

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21892

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mlx5r_umr_cleanup(), mlx5r_umr_recover() and mlx5r_umr_post_send_wait() functions in drivers/infiniband/hw/mlx5/umr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_34-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug: before 6.4.0-150600.10.34.1

kernel-source-rt: before 6.4.0-150600.10.34.1

kernel-devel-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.34.1

gfs2-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt-debugsource: before 6.4.0-150600.10.34.1

kselftests-kmp-rt: before 6.4.0-150600.10.34.1

kernel-syms-rt: before 6.4.0-150600.10.34.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-debuginfo: before 6.4.0-150600.10.34.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.34.1

dlm-kmp-rt: before 6.4.0-150600.10.34.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.34.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt: before 6.4.0-150600.10.34.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.34.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.34.1

kernel-rt-optional: before 6.4.0-150600.10.34.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.34.1

kernel-rt-extra: before 6.4.0-150600.10.34.1

kernel-rt-devel: before 6.4.0-150600.10.34.1

kernel-rt-vdso: before 6.4.0-150600.10.34.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.34.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###