Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23042 (GCVE-0-2026-23042)
Vulnerability from cvelistv5 – Published: 2026-02-04 16:00 – Updated: 2026-02-09 08:37
VLAI?
EPSS
Title
idpf: fix aux device unplugging when rdma is not supported by vport
Summary
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix aux device unplugging when rdma is not supported by vport
If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not
allocate vdev_info for this vport. This leads to kernel NULL pointer
dereference in idpf_idc_vport_dev_down(), which references vdev_info for
every vport regardless.
Check, if vdev_info was ever allocated before unplugging aux device.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/intel/idpf/idpf_idc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "0ad6d6e50e9d8bf596cfe77a882ddc20b29f525a",
"status": "affected",
"version": "be91128c579c86d295da4325f6ac4710e4e6d2b4",
"versionType": "git"
},
{
"lessThan": "4648fb2f2e7210c53b85220ee07d42d1e4bae3f9",
"status": "affected",
"version": "be91128c579c86d295da4325f6ac4710e4e6d2b4",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/intel/idpf/idpf_idc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.17"
},
{
"lessThan": "6.17",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.6",
"versionStartIncluding": "6.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "6.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix aux device unplugging when rdma is not supported by vport\n\nIf vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not\nallocate vdev_info for this vport. This leads to kernel NULL pointer\ndereference in idpf_idc_vport_dev_down(), which references vdev_info for\nevery vport regardless.\n\nCheck, if vdev_info was ever allocated before unplugging aux device."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-09T08:37:37.195Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/0ad6d6e50e9d8bf596cfe77a882ddc20b29f525a"
},
{
"url": "https://git.kernel.org/stable/c/4648fb2f2e7210c53b85220ee07d42d1e4bae3f9"
}
],
"title": "idpf: fix aux device unplugging when rdma is not supported by vport",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23042",
"datePublished": "2026-02-04T16:00:25.466Z",
"dateReserved": "2026-01-13T15:37:45.944Z",
"dateUpdated": "2026-02-09T08:37:37.195Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23042\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-04T16:16:19.680\",\"lastModified\":\"2026-02-04T16:33:44.537\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nidpf: fix aux device unplugging when rdma is not supported by vport\\n\\nIf vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not\\nallocate vdev_info for this vport. This leads to kernel NULL pointer\\ndereference in idpf_idc_vport_dev_down(), which references vdev_info for\\nevery vport regardless.\\n\\nCheck, if vdev_info was ever allocated before unplugging aux device.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0ad6d6e50e9d8bf596cfe77a882ddc20b29f525a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4648fb2f2e7210c53b85220ee07d42d1e4bae3f9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
GHSA-8936-48HJ-4RQP
Vulnerability from github – Published: 2026-02-04 18:30 – Updated: 2026-02-04 18:30
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix aux device unplugging when rdma is not supported by vport
If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not allocate vdev_info for this vport. This leads to kernel NULL pointer dereference in idpf_idc_vport_dev_down(), which references vdev_info for every vport regardless.
Check, if vdev_info was ever allocated before unplugging aux device.
{
"affected": [],
"aliases": [
"CVE-2026-23042"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-04T16:16:19Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix aux device unplugging when rdma is not supported by vport\n\nIf vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not\nallocate vdev_info for this vport. This leads to kernel NULL pointer\ndereference in idpf_idc_vport_dev_down(), which references vdev_info for\nevery vport regardless.\n\nCheck, if vdev_info was ever allocated before unplugging aux device.",
"id": "GHSA-8936-48hj-4rqp",
"modified": "2026-02-04T18:30:41Z",
"published": "2026-02-04T18:30:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23042"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/0ad6d6e50e9d8bf596cfe77a882ddc20b29f525a"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/4648fb2f2e7210c53b85220ee07d42d1e4bae3f9"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2026-0324
Vulnerability from csaf_certbund - Published: 2026-02-04 23:00 - Updated: 2026-03-26 23:00Summary
Linux Kernel: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht näher spezifizierte Angriffe durchzuführen, die möglicherweise zu einer Denial-of-Service- Bedingung führen oder eine Speicherbeschädigung verursachen können.
Betroffene Betriebssysteme: - Linux
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0324 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0324.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0324 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0324"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71192",
"url": "https://lore.kernel.org/linux-cve-announce/2026020438-CVE-2025-71192-3370@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71193",
"url": "https://lore.kernel.org/linux-cve-announce/2026020439-CVE-2025-71193-288d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71194",
"url": "https://lore.kernel.org/linux-cve-announce/2026020448-CVE-2025-71194-1108@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71195",
"url": "https://lore.kernel.org/linux-cve-announce/2026020449-CVE-2025-71195-8c0c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71196",
"url": "https://lore.kernel.org/linux-cve-announce/2026020449-CVE-2025-71196-cf4b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71197",
"url": "https://lore.kernel.org/linux-cve-announce/2026020412-CVE-2025-71197-cfe2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71198",
"url": "https://lore.kernel.org/linux-cve-announce/2026020412-CVE-2025-71198-3572@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71199",
"url": "https://lore.kernel.org/linux-cve-announce/2026020412-CVE-2025-71199-9a60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23040",
"url": "https://lore.kernel.org/linux-cve-announce/2026020438-CVE-2026-23040-1980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23041",
"url": "https://lore.kernel.org/linux-cve-announce/2026020438-CVE-2026-23041-a426@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23042",
"url": "https://lore.kernel.org/linux-cve-announce/2026020439-CVE-2026-23042-ce47@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23043",
"url": "https://lore.kernel.org/linux-cve-announce/2026020439-CVE-2026-23043-4975@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23044",
"url": "https://lore.kernel.org/linux-cve-announce/2026020439-CVE-2026-23044-3312@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23045",
"url": "https://lore.kernel.org/linux-cve-announce/2026020440-CVE-2026-23045-103a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23046",
"url": "https://lore.kernel.org/linux-cve-announce/2026020440-CVE-2026-23046-8bdb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23047",
"url": "https://lore.kernel.org/linux-cve-announce/2026020440-CVE-2026-23047-38d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23048",
"url": "https://lore.kernel.org/linux-cve-announce/2026020441-CVE-2026-23048-f1cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23049",
"url": "https://lore.kernel.org/linux-cve-announce/2026020449-CVE-2026-23049-9298@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23050",
"url": "https://lore.kernel.org/linux-cve-announce/2026020450-CVE-2026-23050-378c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23051",
"url": "https://lore.kernel.org/linux-cve-announce/2026020450-CVE-2026-23051-7ad8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23052",
"url": "https://lore.kernel.org/linux-cve-announce/2026020450-CVE-2026-23052-340f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23053",
"url": "https://lore.kernel.org/linux-cve-announce/2026020451-CVE-2026-23053-f630@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23054",
"url": "https://lore.kernel.org/linux-cve-announce/2026020451-CVE-2026-23054-3712@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23055",
"url": "https://lore.kernel.org/linux-cve-announce/2026020451-CVE-2026-23055-3f25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23056",
"url": "https://lore.kernel.org/linux-cve-announce/2026020413-CVE-2026-23056-ddc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23057",
"url": "https://lore.kernel.org/linux-cve-announce/2026020413-CVE-2026-23057-03eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23058",
"url": "https://lore.kernel.org/linux-cve-announce/2026020414-CVE-2026-23058-802c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23059",
"url": "https://lore.kernel.org/linux-cve-announce/2026020414-CVE-2026-23059-152f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23060",
"url": "https://lore.kernel.org/linux-cve-announce/2026020414-CVE-2026-23060-6a41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23061",
"url": "https://lore.kernel.org/linux-cve-announce/2026020415-CVE-2026-23061-31be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23062",
"url": "https://lore.kernel.org/linux-cve-announce/2026020415-CVE-2026-23062-991d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23063",
"url": "https://lore.kernel.org/linux-cve-announce/2026020415-CVE-2026-23063-d727@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23064",
"url": "https://lore.kernel.org/linux-cve-announce/2026020416-CVE-2026-23064-8eec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23065",
"url": "https://lore.kernel.org/linux-cve-announce/2026020416-CVE-2026-23065-f6ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23066",
"url": "https://lore.kernel.org/linux-cve-announce/2026020416-CVE-2026-23066-8e44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23067",
"url": "https://lore.kernel.org/linux-cve-announce/2026020417-CVE-2026-23067-b41f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23068",
"url": "https://lore.kernel.org/linux-cve-announce/2026020417-CVE-2026-23068-0852@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23069",
"url": "https://lore.kernel.org/linux-cve-announce/2026020417-CVE-2026-23069-d026@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23070",
"url": "https://lore.kernel.org/linux-cve-announce/2026020418-CVE-2026-23070-2fcd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23071",
"url": "https://lore.kernel.org/linux-cve-announce/2026020418-CVE-2026-23071-675b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23072",
"url": "https://lore.kernel.org/linux-cve-announce/2026020418-CVE-2026-23072-916e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23073",
"url": "https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23073-9fce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23074",
"url": "https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23074-6bb8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23075",
"url": "https://lore.kernel.org/linux-cve-announce/2026020419-CVE-2026-23075-0aef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23076",
"url": "https://lore.kernel.org/linux-cve-announce/2026020420-CVE-2026-23076-b054@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23077",
"url": "https://lore.kernel.org/linux-cve-announce/2026020420-CVE-2026-23077-6880@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23078",
"url": "https://lore.kernel.org/linux-cve-announce/2026020420-CVE-2026-23078-61cc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23079",
"url": "https://lore.kernel.org/linux-cve-announce/2026020421-CVE-2026-23079-bb7e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23080",
"url": "https://lore.kernel.org/linux-cve-announce/2026020421-CVE-2026-23080-74d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23081",
"url": "https://lore.kernel.org/linux-cve-announce/2026020421-CVE-2026-23081-5494@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23082",
"url": "https://lore.kernel.org/linux-cve-announce/2026020422-CVE-2026-23082-7bc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23083",
"url": "https://lore.kernel.org/linux-cve-announce/2026020422-CVE-2026-23083-8968@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23084",
"url": "https://lore.kernel.org/linux-cve-announce/2026020422-CVE-2026-23084-8073@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23085",
"url": "https://lore.kernel.org/linux-cve-announce/2026020423-CVE-2026-23085-14e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23086",
"url": "https://lore.kernel.org/linux-cve-announce/2026020423-CVE-2026-23086-9ad9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23087",
"url": "https://lore.kernel.org/linux-cve-announce/2026020423-CVE-2026-23087-f17e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23088",
"url": "https://lore.kernel.org/linux-cve-announce/2026020424-CVE-2026-23088-e0da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23089",
"url": "https://lore.kernel.org/linux-cve-announce/2026020424-CVE-2026-23089-760f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23090",
"url": "https://lore.kernel.org/linux-cve-announce/2026020425-CVE-2026-23090-2971@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23091",
"url": "https://lore.kernel.org/linux-cve-announce/2026020425-CVE-2026-23091-4580@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23092",
"url": "https://lore.kernel.org/linux-cve-announce/2026020425-CVE-2026-23092-fc15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23093",
"url": "https://lore.kernel.org/linux-cve-announce/2026020426-CVE-2026-23093-db0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23094",
"url": "https://lore.kernel.org/linux-cve-announce/2026020426-CVE-2026-23094-9cb7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23095",
"url": "https://lore.kernel.org/linux-cve-announce/2026020426-CVE-2026-23095-66e8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23096",
"url": "https://lore.kernel.org/linux-cve-announce/2026020427-CVE-2026-23096-e5af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23097",
"url": "https://lore.kernel.org/linux-cve-announce/2026020427-CVE-2026-23097-a591@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23098",
"url": "https://lore.kernel.org/linux-cve-announce/2026020427-CVE-2026-23098-1fd2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23099",
"url": "https://lore.kernel.org/linux-cve-announce/2026020428-CVE-2026-23099-a393@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23100",
"url": "https://lore.kernel.org/linux-cve-announce/2026020428-CVE-2026-23100-b482@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23101",
"url": "https://lore.kernel.org/linux-cve-announce/2026020428-CVE-2026-23101-47e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23102",
"url": "https://lore.kernel.org/linux-cve-announce/2026020429-CVE-2026-23102-bafe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23103",
"url": "https://lore.kernel.org/linux-cve-announce/2026020429-CVE-2026-23103-63b3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23104",
"url": "https://lore.kernel.org/linux-cve-announce/2026020429-CVE-2026-23104-3802@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23105",
"url": "https://lore.kernel.org/linux-cve-announce/2026020430-CVE-2026-23105-1d6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23106",
"url": "https://lore.kernel.org/linux-cve-announce/2026020430-CVE-2026-23106-3edb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23107",
"url": "https://lore.kernel.org/linux-cve-announce/2026020430-CVE-2026-23107-50d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23108",
"url": "https://lore.kernel.org/linux-cve-announce/2026020431-CVE-2026-23108-0550@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23109",
"url": "https://lore.kernel.org/linux-cve-announce/2026020431-CVE-2026-23109-3e57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23110",
"url": "https://lore.kernel.org/linux-cve-announce/2026020431-CVE-2026-23110-56b1@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3083 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3083"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3110 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3110"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3277 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3277"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3268 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3268"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3083.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3360 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3360"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3388 vom 2026-02-26",
"url": "https://access.redhat.com/errata/RHSA-2026:3388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3463 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3488 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3488"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3464 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3464"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3488 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-3488.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3464 vom 2026-03-03",
"url": "https://linux.oracle.com/errata/ELSA-2026-3464.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3634 vom 2026-03-03",
"url": "https://access.redhat.com/errata/RHSA-2026:3634"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3464 vom 2026-03-04",
"url": "https://errata.build.resf.org/RLSA-2026:3464"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3463 vom 2026-03-04",
"url": "https://errata.build.resf.org/RLSA-2026:3463"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3810 vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3810"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3488 vom 2026-03-05",
"url": "https://errata.build.resf.org/RLSA-2026:3488"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4012 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-50144.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6162 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00072.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-3 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-4 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20711-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0928-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20667-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20720-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-099 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-099.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-114 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20713-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-5 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8096-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0962-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0961-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8116-1 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8116-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50160 vom 2026-03-24",
"url": "https://linux.oracle.com/errata/ELSA-2026-50160.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3685 vom 2026-03-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3685.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0984-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1041-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1003-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1081-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1078-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1077-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-26T23:00:00.000+00:00",
"generator": {
"date": "2026-03-27T09:11:18.538+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0324",
"initial_release_date": "2026-02-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "24"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T050562",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71192",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71192"
},
{
"cve": "CVE-2025-71193",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71193"
},
{
"cve": "CVE-2025-71194",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71194"
},
{
"cve": "CVE-2025-71195",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71195"
},
{
"cve": "CVE-2025-71196",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71196"
},
{
"cve": "CVE-2025-71197",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71197"
},
{
"cve": "CVE-2025-71198",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71198"
},
{
"cve": "CVE-2025-71199",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2025-71199"
},
{
"cve": "CVE-2026-23040",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23040"
},
{
"cve": "CVE-2026-23041",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23041"
},
{
"cve": "CVE-2026-23042",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23042"
},
{
"cve": "CVE-2026-23043",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23043"
},
{
"cve": "CVE-2026-23044",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23044"
},
{
"cve": "CVE-2026-23045",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23045"
},
{
"cve": "CVE-2026-23046",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23046"
},
{
"cve": "CVE-2026-23047",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23047"
},
{
"cve": "CVE-2026-23048",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23048"
},
{
"cve": "CVE-2026-23049",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23049"
},
{
"cve": "CVE-2026-23050",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23050"
},
{
"cve": "CVE-2026-23051",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23051"
},
{
"cve": "CVE-2026-23052",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23052"
},
{
"cve": "CVE-2026-23053",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23053"
},
{
"cve": "CVE-2026-23054",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23055",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23055"
},
{
"cve": "CVE-2026-23056",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23056"
},
{
"cve": "CVE-2026-23057",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23057"
},
{
"cve": "CVE-2026-23058",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23058"
},
{
"cve": "CVE-2026-23059",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23059"
},
{
"cve": "CVE-2026-23060",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23061",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23061"
},
{
"cve": "CVE-2026-23062",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23062"
},
{
"cve": "CVE-2026-23063",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23063"
},
{
"cve": "CVE-2026-23064",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23064"
},
{
"cve": "CVE-2026-23065",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23065"
},
{
"cve": "CVE-2026-23066",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23066"
},
{
"cve": "CVE-2026-23067",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23067"
},
{
"cve": "CVE-2026-23068",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23068"
},
{
"cve": "CVE-2026-23069",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23069"
},
{
"cve": "CVE-2026-23070",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23070"
},
{
"cve": "CVE-2026-23071",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23071"
},
{
"cve": "CVE-2026-23072",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23072"
},
{
"cve": "CVE-2026-23073",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23073"
},
{
"cve": "CVE-2026-23074",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23075",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23075"
},
{
"cve": "CVE-2026-23076",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23076"
},
{
"cve": "CVE-2026-23077",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23077"
},
{
"cve": "CVE-2026-23078",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23078"
},
{
"cve": "CVE-2026-23079",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23079"
},
{
"cve": "CVE-2026-23080",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23080"
},
{
"cve": "CVE-2026-23081",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23081"
},
{
"cve": "CVE-2026-23082",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23082"
},
{
"cve": "CVE-2026-23083",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23083"
},
{
"cve": "CVE-2026-23084",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23084"
},
{
"cve": "CVE-2026-23085",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23085"
},
{
"cve": "CVE-2026-23086",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23086"
},
{
"cve": "CVE-2026-23087",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23087"
},
{
"cve": "CVE-2026-23088",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23088"
},
{
"cve": "CVE-2026-23089",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23090",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23090"
},
{
"cve": "CVE-2026-23091",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23091"
},
{
"cve": "CVE-2026-23092",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23092"
},
{
"cve": "CVE-2026-23093",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23093"
},
{
"cve": "CVE-2026-23094",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23094"
},
{
"cve": "CVE-2026-23095",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23095"
},
{
"cve": "CVE-2026-23096",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23096"
},
{
"cve": "CVE-2026-23097",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23097"
},
{
"cve": "CVE-2026-23098",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23098"
},
{
"cve": "CVE-2026-23099",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23099"
},
{
"cve": "CVE-2026-23100",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23100"
},
{
"cve": "CVE-2026-23101",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23101"
},
{
"cve": "CVE-2026-23102",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23102"
},
{
"cve": "CVE-2026-23103",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23103"
},
{
"cve": "CVE-2026-23104",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23104"
},
{
"cve": "CVE-2026-23105",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23105"
},
{
"cve": "CVE-2026-23106",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23106"
},
{
"cve": "CVE-2026-23107",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23107"
},
{
"cve": "CVE-2026-23108",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23108"
},
{
"cve": "CVE-2026-23109",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23109"
},
{
"cve": "CVE-2026-23110",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"398363",
"T004914",
"T032255",
"T050562"
]
},
"release_date": "2026-02-04T23:00:00.000+00:00",
"title": "CVE-2026-23110"
}
]
}
FKIE_CVE-2026-23042
Vulnerability from fkie_nvd - Published: 2026-02-04 16:16 - Updated: 2026-02-04 16:33
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix aux device unplugging when rdma is not supported by vport
If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not
allocate vdev_info for this vport. This leads to kernel NULL pointer
dereference in idpf_idc_vport_dev_down(), which references vdev_info for
every vport regardless.
Check, if vdev_info was ever allocated before unplugging aux device.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix aux device unplugging when rdma is not supported by vport\n\nIf vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not\nallocate vdev_info for this vport. This leads to kernel NULL pointer\ndereference in idpf_idc_vport_dev_down(), which references vdev_info for\nevery vport regardless.\n\nCheck, if vdev_info was ever allocated before unplugging aux device."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nidpf: correcci\u00f3n de la desconexi\u00f3n del dispositivo auxiliar cuando rdma no es compatible con el vport\n\nSi los flags del vport no contienen VIRTCHNL2_VPORT_ENABLE_RDMA, el controlador no asigna vdev_info para este vport. Esto lleva a una desreferencia de puntero NULL del kernel en idpf_idc_vport_dev_down(), que referencia vdev_info para cada vport independientemente.\n\nCompruebe si vdev_info fue alguna vez asignado antes de desconectar el dispositivo auxiliar."
}
],
"id": "CVE-2026-23042",
"lastModified": "2026-02-04T16:33:44.537",
"metrics": {},
"published": "2026-02-04T16:16:19.680",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/0ad6d6e50e9d8bf596cfe77a882ddc20b29f525a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/4648fb2f2e7210c53b85220ee07d42d1e4bae3f9"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
SUSE-SU-2026:20838-1
Vulnerability from csaf_suse - Published: 2026-03-25 08:48 - Updated: 2026-03-25 08:48Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues.
The following security issues were fixed:
- CVE-2025-39753: gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops (bsc#1249590).
- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).
- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).
- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).
- CVE-2025-40230: mm: prevent poison consumption when splitting THP (bsc#1254817).
- CVE-2025-68173: ftrace: Fix softlockup in ftrace_module_enable (bsc#1255311).
- CVE-2025-68186: ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up (bsc#1255144).
- CVE-2025-68292: mm/memfd: fix information leak in hugetlb folios (bsc#1255148).
- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).
- CVE-2025-68329: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs (bsc#1255490).
- CVE-2025-68371: scsi: smartpqi: Fix device resources accessed after device removal (bsc#1255572).
- CVE-2025-68745: scsi: qla2xxx: Clear cmds after chip reset (bsc#1255721).
- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).
- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).
- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).
- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).
- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).
- CVE-2025-71134: mm/page_alloc: change all pageblocks migrate type on coalescing (bsc#1256732).
- CVE-2025-71161: dm-verity: disable recursive forward error correction (bsc#1257174).
- CVE-2025-71184: btrfs: tracepoints: use btrfs_root_id() to get the id of a root (bsc#1257635).
- CVE-2025-71193: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend (bsc#1257686).
- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).
- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).
- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).
- CVE-2026-23003: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() (bsc#1257246).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).
- CVE-2026-23022: idpf: fix memory leak in idpf_vc_core_deinit() (bsc#1257581).
- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).
- CVE-2026-23024: idpf: fix memory leak of flow steer list on rmmod (bsc#1257572).
- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).
- CVE-2026-23042: idpf: fix aux device unplugging when rdma is not supported by vport (bsc#1257705).
- CVE-2026-23047: libceph: make calc_target() set t->paused, not just clear it (bsc#1257682).
- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).
- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
- CVE-2026-23066: rxrpc: Fix recvmsg() unconditional requeue (bsc#1257726).
- CVE-2026-23068: spi: spi-sprd-adi: Fix double free in probe error path (bsc#1257805).
- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).
- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23083: tools: ynl-gen: use big-endian netlink attribute types (bsc#1257745).
- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).
- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).
- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).
- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).
- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
- CVE-2026-23097: migrate: correct lock ordering for hugetlb file folios (bsc#1257815).
- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).
- CVE-2026-23100: mm/hugetlb: fix hugetlb_pmd_shared() (bsc#1257817).
- CVE-2026-23102: arm64/fpsimd: signal: Fix restoration of SVE context (bsc#1257772).
- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).
- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).
- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).
- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).
- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).
- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).
- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).
- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).
- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).
- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).
- CVE-2026-23142: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (bsc#1258289).
- CVE-2026-23144: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure (bsc#1258290).
- CVE-2026-23148: nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference (bsc#1258258).
- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).
- CVE-2026-23161: mm/shmem, swap: fix race of truncate and swap entry split (bsc#1258355).
- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).
- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).
- CVE-2026-23171: bonding: fix use-after-free due to enslave fail after slave array update (bsc#1258349).
- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).
- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).
- CVE-2026-23189: ceph: fix NULL pointer dereference in ceph_mds_auth_match() (bsc#1258308).
- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).
- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).
- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).
- CVE-2026-23223: xfs: fix UAF in xchk_btree_check_block_owner (bsc#1258483).
- CVE-2026-23224: erofs: fix UAF issue for file-backed mounts w/ directio option (bsc#1258461).
The following non security issues were fixed:
- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).
- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).
- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).
- Add bugnumber to existing mana and mana_ib changes (bsc#1251135 bsc#1251971).
- HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list (bsc#1258455).
- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).
- PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1255868).
- PCI: Add ASPEED vendor ID to pci_ids.h (bsc#1258672)
- PCI: Add PCI_BRIDGE_NO_ALIAS quirk for ASPEED AST1150 (bsc#1258672)
- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).
- Refresh and move upstreamed ath12k patch into sorted section
- Update "drm/mgag200: fix mgag200_bmc_stop_scanout()" bug number (bsc#1258153)
- add bugnumber to existing mana change (bsc#1252266).
- arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS (bsc#1259329)
- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).
- can: bcm: fix locking for bcm_op runtime updates (git-fixes).
- clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops (git-fixes).
- clocksource: Fix the CPUs' choice in the watchdog per CPU verification (bsc#1257818).
- clocksource: Print durations for sync check unconditionally (bsc#1257818).
- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1257818).
- clocksource: Use pr_info() for "Checking clocksource synchronization" message (bsc#1257818).
- dm: Fix deadlock when reloading a multipath table (bsc#1254928).
- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).
- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).
- gpiolib-acpi: Update file references in the Documentation and MAINTAINERS (git-fixes).
- i3c: master: Update hot-join flag only on success (git-fixes).
- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).
- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).
- modpost: Ensure exported symbol namespaces are not quoted (bsc#1258489).
- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).
- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).
- platform/x86/amd: amd_3d_vcache: Add AMD 3D V-Cache optimizer driver (jsc#PED-11563).
- sched/core: Avoid direct access to hrtimer clockbase (bsc#1234634).
- sched/deadline: Fix race in push_dl_task() (bsc#1234634).
- sched/deadline: Stop dl_server before CPU goes offline (bsc#1234634).
- sched/fair: Fix pelt clock sync when entering idle (bsc#1234634).
- sched/fair: Fix pelt lost idle time detection (bsc#1234634).
- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).
- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).
Patchnames: SUSE-SL-Micro-6.2-435
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues.\n\nThe following security issues were fixed:\n\n- CVE-2025-39753: gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops (bsc#1249590).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-40230: mm: prevent poison consumption when splitting THP (bsc#1254817).\n- CVE-2025-68173: ftrace: Fix softlockup in ftrace_module_enable (bsc#1255311).\n- CVE-2025-68186: ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up (bsc#1255144).\n- CVE-2025-68292: mm/memfd: fix information leak in hugetlb folios (bsc#1255148).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68329: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs (bsc#1255490).\n- CVE-2025-68371: scsi: smartpqi: Fix device resources accessed after device removal (bsc#1255572).\n- CVE-2025-68745: scsi: qla2xxx: Clear cmds after chip reset (bsc#1255721).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).\n- CVE-2025-71134: mm/page_alloc: change all pageblocks migrate type on coalescing (bsc#1256732).\n- CVE-2025-71161: dm-verity: disable recursive forward error correction (bsc#1257174).\n- CVE-2025-71184: btrfs: tracepoints: use btrfs_root_id() to get the id of a root (bsc#1257635).\n- CVE-2025-71193: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend (bsc#1257686).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23022: idpf: fix memory leak in idpf_vc_core_deinit() (bsc#1257581).\n- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).\n- CVE-2026-23024: idpf: fix memory leak of flow steer list on rmmod (bsc#1257572).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23042: idpf: fix aux device unplugging when rdma is not supported by vport (bsc#1257705).\n- CVE-2026-23047: libceph: make calc_target() set t-\u003epaused, not just clear it (bsc#1257682).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23066: rxrpc: Fix recvmsg() unconditional requeue (bsc#1257726).\n- CVE-2026-23068: spi: spi-sprd-adi: Fix double free in probe error path (bsc#1257805).\n- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).\n- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: tools: ynl-gen: use big-endian netlink attribute types (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23097: migrate: correct lock ordering for hugetlb file folios (bsc#1257815).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23100: mm/hugetlb: fix hugetlb_pmd_shared() (bsc#1257817).\n- CVE-2026-23102: arm64/fpsimd: signal: Fix restoration of SVE context (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23142: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (bsc#1258289).\n- CVE-2026-23144: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure (bsc#1258290).\n- CVE-2026-23148: nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference (bsc#1258258).\n- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).\n- CVE-2026-23161: mm/shmem, swap: fix race of truncate and swap entry split (bsc#1258355).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).\n- CVE-2026-23171: bonding: fix use-after-free due to enslave fail after slave array update (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23189: ceph: fix NULL pointer dereference in ceph_mds_auth_match() (bsc#1258308).\n- CVE-2026-23198: KVM: Don\u0027t clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n- CVE-2026-23223: xfs: fix UAF in xchk_btree_check_block_owner (bsc#1258483).\n- CVE-2026-23224: erofs: fix UAF issue for file-backed mounts w/ directio option (bsc#1258461).\n\nThe following non security issues were fixed:\n\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- Add bugnumber to existing mana and mana_ib changes (bsc#1251135 bsc#1251971).\n- HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list (bsc#1258455).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1255868).\n- PCI: Add ASPEED vendor ID to pci_ids.h (bsc#1258672)\n- PCI: Add PCI_BRIDGE_NO_ALIAS quirk for ASPEED AST1150 (bsc#1258672)\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- Refresh and move upstreamed ath12k patch into sorted section\n- Update \"drm/mgag200: fix mgag200_bmc_stop_scanout()\" bug number (bsc#1258153)\n- add bugnumber to existing mana change (bsc#1252266).\n- arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS (bsc#1259329)\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- can: bcm: fix locking for bcm_op runtime updates (git-fixes).\n- clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops (git-fixes).\n- clocksource: Fix the CPUs\u0027 choice in the watchdog per CPU verification (bsc#1257818).\n- clocksource: Print durations for sync check unconditionally (bsc#1257818).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1257818).\n- clocksource: Use pr_info() for \"Checking clocksource synchronization\" message (bsc#1257818).\n- dm: Fix deadlock when reloading a multipath table (bsc#1254928).\n- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- gpiolib-acpi: Update file references in the Documentation and MAINTAINERS (git-fixes).\n- i3c: master: Update hot-join flag only on success (git-fixes).\n- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- modpost: Ensure exported symbol namespaces are not quoted (bsc#1258489).\n- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- platform/x86/amd: amd_3d_vcache: Add AMD 3D V-Cache optimizer driver (jsc#PED-11563).\n- sched/core: Avoid direct access to hrtimer clockbase (bsc#1234634).\n- sched/deadline: Fix race in push_dl_task() (bsc#1234634).\n- sched/deadline: Stop dl_server before CPU goes offline (bsc#1234634).\n- sched/fair: Fix pelt clock sync when entering idle (bsc#1234634).\n- sched/fair: Fix pelt lost idle time detection (bsc#1234634).\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-435",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20838-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20838-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620838-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20838-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234634",
"url": "https://bugzilla.suse.com/1234634"
},
{
"category": "self",
"summary": "SUSE Bug 1249590",
"url": "https://bugzilla.suse.com/1249590"
},
{
"category": "self",
"summary": "SUSE Bug 1250748",
"url": "https://bugzilla.suse.com/1250748"
},
{
"category": "self",
"summary": "SUSE Bug 1251135",
"url": "https://bugzilla.suse.com/1251135"
},
{
"category": "self",
"summary": "SUSE Bug 1251966",
"url": "https://bugzilla.suse.com/1251966"
},
{
"category": "self",
"summary": "SUSE Bug 1251971",
"url": "https://bugzilla.suse.com/1251971"
},
{
"category": "self",
"summary": "SUSE Bug 1252008",
"url": "https://bugzilla.suse.com/1252008"
},
{
"category": "self",
"summary": "SUSE Bug 1252266",
"url": "https://bugzilla.suse.com/1252266"
},
{
"category": "self",
"summary": "SUSE Bug 1252911",
"url": "https://bugzilla.suse.com/1252911"
},
{
"category": "self",
"summary": "SUSE Bug 1252924",
"url": "https://bugzilla.suse.com/1252924"
},
{
"category": "self",
"summary": "SUSE Bug 1253129",
"url": "https://bugzilla.suse.com/1253129"
},
{
"category": "self",
"summary": "SUSE Bug 1253691",
"url": "https://bugzilla.suse.com/1253691"
},
{
"category": "self",
"summary": "SUSE Bug 1254817",
"url": "https://bugzilla.suse.com/1254817"
},
{
"category": "self",
"summary": "SUSE Bug 1254928",
"url": "https://bugzilla.suse.com/1254928"
},
{
"category": "self",
"summary": "SUSE Bug 1255129",
"url": "https://bugzilla.suse.com/1255129"
},
{
"category": "self",
"summary": "SUSE Bug 1255144",
"url": "https://bugzilla.suse.com/1255144"
},
{
"category": "self",
"summary": "SUSE Bug 1255148",
"url": "https://bugzilla.suse.com/1255148"
},
{
"category": "self",
"summary": "SUSE Bug 1255311",
"url": "https://bugzilla.suse.com/1255311"
},
{
"category": "self",
"summary": "SUSE Bug 1255490",
"url": "https://bugzilla.suse.com/1255490"
},
{
"category": "self",
"summary": "SUSE Bug 1255572",
"url": "https://bugzilla.suse.com/1255572"
},
{
"category": "self",
"summary": "SUSE Bug 1255721",
"url": "https://bugzilla.suse.com/1255721"
},
{
"category": "self",
"summary": "SUSE Bug 1255868",
"url": "https://bugzilla.suse.com/1255868"
},
{
"category": "self",
"summary": "SUSE Bug 1256640",
"url": "https://bugzilla.suse.com/1256640"
},
{
"category": "self",
"summary": "SUSE Bug 1256675",
"url": "https://bugzilla.suse.com/1256675"
},
{
"category": "self",
"summary": "SUSE Bug 1256679",
"url": "https://bugzilla.suse.com/1256679"
},
{
"category": "self",
"summary": "SUSE Bug 1256708",
"url": "https://bugzilla.suse.com/1256708"
},
{
"category": "self",
"summary": "SUSE Bug 1256732",
"url": "https://bugzilla.suse.com/1256732"
},
{
"category": "self",
"summary": "SUSE Bug 1256784",
"url": "https://bugzilla.suse.com/1256784"
},
{
"category": "self",
"summary": "SUSE Bug 1256802",
"url": "https://bugzilla.suse.com/1256802"
},
{
"category": "self",
"summary": "SUSE Bug 1256865",
"url": "https://bugzilla.suse.com/1256865"
},
{
"category": "self",
"summary": "SUSE Bug 1256867",
"url": "https://bugzilla.suse.com/1256867"
},
{
"category": "self",
"summary": "SUSE Bug 1257154",
"url": "https://bugzilla.suse.com/1257154"
},
{
"category": "self",
"summary": "SUSE Bug 1257174",
"url": "https://bugzilla.suse.com/1257174"
},
{
"category": "self",
"summary": "SUSE Bug 1257209",
"url": "https://bugzilla.suse.com/1257209"
},
{
"category": "self",
"summary": "SUSE Bug 1257222",
"url": "https://bugzilla.suse.com/1257222"
},
{
"category": "self",
"summary": "SUSE Bug 1257228",
"url": "https://bugzilla.suse.com/1257228"
},
{
"category": "self",
"summary": "SUSE Bug 1257231",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "self",
"summary": "SUSE Bug 1257246",
"url": "https://bugzilla.suse.com/1257246"
},
{
"category": "self",
"summary": "SUSE Bug 1257332",
"url": "https://bugzilla.suse.com/1257332"
},
{
"category": "self",
"summary": "SUSE Bug 1257466",
"url": "https://bugzilla.suse.com/1257466"
},
{
"category": "self",
"summary": "SUSE Bug 1257472",
"url": "https://bugzilla.suse.com/1257472"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257551",
"url": "https://bugzilla.suse.com/1257551"
},
{
"category": "self",
"summary": "SUSE Bug 1257552",
"url": "https://bugzilla.suse.com/1257552"
},
{
"category": "self",
"summary": "SUSE Bug 1257553",
"url": "https://bugzilla.suse.com/1257553"
},
{
"category": "self",
"summary": "SUSE Bug 1257554",
"url": "https://bugzilla.suse.com/1257554"
},
{
"category": "self",
"summary": "SUSE Bug 1257556",
"url": "https://bugzilla.suse.com/1257556"
},
{
"category": "self",
"summary": "SUSE Bug 1257557",
"url": "https://bugzilla.suse.com/1257557"
},
{
"category": "self",
"summary": "SUSE Bug 1257559",
"url": "https://bugzilla.suse.com/1257559"
},
{
"category": "self",
"summary": "SUSE Bug 1257560",
"url": "https://bugzilla.suse.com/1257560"
},
{
"category": "self",
"summary": "SUSE Bug 1257561",
"url": "https://bugzilla.suse.com/1257561"
},
{
"category": "self",
"summary": "SUSE Bug 1257562",
"url": "https://bugzilla.suse.com/1257562"
},
{
"category": "self",
"summary": "SUSE Bug 1257565",
"url": "https://bugzilla.suse.com/1257565"
},
{
"category": "self",
"summary": "SUSE Bug 1257570",
"url": "https://bugzilla.suse.com/1257570"
},
{
"category": "self",
"summary": "SUSE Bug 1257572",
"url": "https://bugzilla.suse.com/1257572"
},
{
"category": "self",
"summary": "SUSE Bug 1257573",
"url": "https://bugzilla.suse.com/1257573"
},
{
"category": "self",
"summary": "SUSE Bug 1257576",
"url": "https://bugzilla.suse.com/1257576"
},
{
"category": "self",
"summary": "SUSE Bug 1257579",
"url": "https://bugzilla.suse.com/1257579"
},
{
"category": "self",
"summary": "SUSE Bug 1257580",
"url": "https://bugzilla.suse.com/1257580"
},
{
"category": "self",
"summary": "SUSE Bug 1257581",
"url": "https://bugzilla.suse.com/1257581"
},
{
"category": "self",
"summary": "SUSE Bug 1257586",
"url": "https://bugzilla.suse.com/1257586"
},
{
"category": "self",
"summary": "SUSE Bug 1257600",
"url": "https://bugzilla.suse.com/1257600"
},
{
"category": "self",
"summary": "SUSE Bug 1257631",
"url": "https://bugzilla.suse.com/1257631"
},
{
"category": "self",
"summary": "SUSE Bug 1257635",
"url": "https://bugzilla.suse.com/1257635"
},
{
"category": "self",
"summary": "SUSE Bug 1257679",
"url": "https://bugzilla.suse.com/1257679"
},
{
"category": "self",
"summary": "SUSE Bug 1257682",
"url": "https://bugzilla.suse.com/1257682"
},
{
"category": "self",
"summary": "SUSE Bug 1257686",
"url": "https://bugzilla.suse.com/1257686"
},
{
"category": "self",
"summary": "SUSE Bug 1257687",
"url": "https://bugzilla.suse.com/1257687"
},
{
"category": "self",
"summary": "SUSE Bug 1257688",
"url": "https://bugzilla.suse.com/1257688"
},
{
"category": "self",
"summary": "SUSE Bug 1257704",
"url": "https://bugzilla.suse.com/1257704"
},
{
"category": "self",
"summary": "SUSE Bug 1257705",
"url": "https://bugzilla.suse.com/1257705"
},
{
"category": "self",
"summary": "SUSE Bug 1257706",
"url": "https://bugzilla.suse.com/1257706"
},
{
"category": "self",
"summary": "SUSE Bug 1257707",
"url": "https://bugzilla.suse.com/1257707"
},
{
"category": "self",
"summary": "SUSE Bug 1257709",
"url": "https://bugzilla.suse.com/1257709"
},
{
"category": "self",
"summary": "SUSE Bug 1257714",
"url": "https://bugzilla.suse.com/1257714"
},
{
"category": "self",
"summary": "SUSE Bug 1257715",
"url": "https://bugzilla.suse.com/1257715"
},
{
"category": "self",
"summary": "SUSE Bug 1257716",
"url": "https://bugzilla.suse.com/1257716"
},
{
"category": "self",
"summary": "SUSE Bug 1257718",
"url": "https://bugzilla.suse.com/1257718"
},
{
"category": "self",
"summary": "SUSE Bug 1257722",
"url": "https://bugzilla.suse.com/1257722"
},
{
"category": "self",
"summary": "SUSE Bug 1257723",
"url": "https://bugzilla.suse.com/1257723"
},
{
"category": "self",
"summary": "SUSE Bug 1257726",
"url": "https://bugzilla.suse.com/1257726"
},
{
"category": "self",
"summary": "SUSE Bug 1257729",
"url": "https://bugzilla.suse.com/1257729"
},
{
"category": "self",
"summary": "SUSE Bug 1257730",
"url": "https://bugzilla.suse.com/1257730"
},
{
"category": "self",
"summary": "SUSE Bug 1257732",
"url": "https://bugzilla.suse.com/1257732"
},
{
"category": "self",
"summary": "SUSE Bug 1257734",
"url": "https://bugzilla.suse.com/1257734"
},
{
"category": "self",
"summary": "SUSE Bug 1257735",
"url": "https://bugzilla.suse.com/1257735"
},
{
"category": "self",
"summary": "SUSE Bug 1257737",
"url": "https://bugzilla.suse.com/1257737"
},
{
"category": "self",
"summary": "SUSE Bug 1257739",
"url": "https://bugzilla.suse.com/1257739"
},
{
"category": "self",
"summary": "SUSE Bug 1257740",
"url": "https://bugzilla.suse.com/1257740"
},
{
"category": "self",
"summary": "SUSE Bug 1257741",
"url": "https://bugzilla.suse.com/1257741"
},
{
"category": "self",
"summary": "SUSE Bug 1257742",
"url": "https://bugzilla.suse.com/1257742"
},
{
"category": "self",
"summary": "SUSE Bug 1257743",
"url": "https://bugzilla.suse.com/1257743"
},
{
"category": "self",
"summary": "SUSE Bug 1257745",
"url": "https://bugzilla.suse.com/1257745"
},
{
"category": "self",
"summary": "SUSE Bug 1257749",
"url": "https://bugzilla.suse.com/1257749"
},
{
"category": "self",
"summary": "SUSE Bug 1257750",
"url": "https://bugzilla.suse.com/1257750"
},
{
"category": "self",
"summary": "SUSE Bug 1257755",
"url": "https://bugzilla.suse.com/1257755"
},
{
"category": "self",
"summary": "SUSE Bug 1257757",
"url": "https://bugzilla.suse.com/1257757"
},
{
"category": "self",
"summary": "SUSE Bug 1257758",
"url": "https://bugzilla.suse.com/1257758"
},
{
"category": "self",
"summary": "SUSE Bug 1257759",
"url": "https://bugzilla.suse.com/1257759"
},
{
"category": "self",
"summary": "SUSE Bug 1257761",
"url": "https://bugzilla.suse.com/1257761"
},
{
"category": "self",
"summary": "SUSE Bug 1257762",
"url": "https://bugzilla.suse.com/1257762"
},
{
"category": "self",
"summary": "SUSE Bug 1257763",
"url": "https://bugzilla.suse.com/1257763"
},
{
"category": "self",
"summary": "SUSE Bug 1257765",
"url": "https://bugzilla.suse.com/1257765"
},
{
"category": "self",
"summary": "SUSE Bug 1257768",
"url": "https://bugzilla.suse.com/1257768"
},
{
"category": "self",
"summary": "SUSE Bug 1257770",
"url": "https://bugzilla.suse.com/1257770"
},
{
"category": "self",
"summary": "SUSE Bug 1257772",
"url": "https://bugzilla.suse.com/1257772"
},
{
"category": "self",
"summary": "SUSE Bug 1257775",
"url": "https://bugzilla.suse.com/1257775"
},
{
"category": "self",
"summary": "SUSE Bug 1257776",
"url": "https://bugzilla.suse.com/1257776"
},
{
"category": "self",
"summary": "SUSE Bug 1257788",
"url": "https://bugzilla.suse.com/1257788"
},
{
"category": "self",
"summary": "SUSE Bug 1257789",
"url": "https://bugzilla.suse.com/1257789"
},
{
"category": "self",
"summary": "SUSE Bug 1257790",
"url": "https://bugzilla.suse.com/1257790"
},
{
"category": "self",
"summary": "SUSE Bug 1257805",
"url": "https://bugzilla.suse.com/1257805"
},
{
"category": "self",
"summary": "SUSE Bug 1257808",
"url": "https://bugzilla.suse.com/1257808"
},
{
"category": "self",
"summary": "SUSE Bug 1257809",
"url": "https://bugzilla.suse.com/1257809"
},
{
"category": "self",
"summary": "SUSE Bug 1257811",
"url": "https://bugzilla.suse.com/1257811"
},
{
"category": "self",
"summary": "SUSE Bug 1257813",
"url": "https://bugzilla.suse.com/1257813"
},
{
"category": "self",
"summary": "SUSE Bug 1257814",
"url": "https://bugzilla.suse.com/1257814"
},
{
"category": "self",
"summary": "SUSE Bug 1257815",
"url": "https://bugzilla.suse.com/1257815"
},
{
"category": "self",
"summary": "SUSE Bug 1257816",
"url": "https://bugzilla.suse.com/1257816"
},
{
"category": "self",
"summary": "SUSE Bug 1257817",
"url": "https://bugzilla.suse.com/1257817"
},
{
"category": "self",
"summary": "SUSE Bug 1257818",
"url": "https://bugzilla.suse.com/1257818"
},
{
"category": "self",
"summary": "SUSE Bug 1257830",
"url": "https://bugzilla.suse.com/1257830"
},
{
"category": "self",
"summary": "SUSE Bug 1257942",
"url": "https://bugzilla.suse.com/1257942"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258153",
"url": "https://bugzilla.suse.com/1258153"
},
{
"category": "self",
"summary": "SUSE Bug 1258181",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "self",
"summary": "SUSE Bug 1258184",
"url": "https://bugzilla.suse.com/1258184"
},
{
"category": "self",
"summary": "SUSE Bug 1258222",
"url": "https://bugzilla.suse.com/1258222"
},
{
"category": "self",
"summary": "SUSE Bug 1258232",
"url": "https://bugzilla.suse.com/1258232"
},
{
"category": "self",
"summary": "SUSE Bug 1258234",
"url": "https://bugzilla.suse.com/1258234"
},
{
"category": "self",
"summary": "SUSE Bug 1258237",
"url": "https://bugzilla.suse.com/1258237"
},
{
"category": "self",
"summary": "SUSE Bug 1258245",
"url": "https://bugzilla.suse.com/1258245"
},
{
"category": "self",
"summary": "SUSE Bug 1258249",
"url": "https://bugzilla.suse.com/1258249"
},
{
"category": "self",
"summary": "SUSE Bug 1258252",
"url": "https://bugzilla.suse.com/1258252"
},
{
"category": "self",
"summary": "SUSE Bug 1258256",
"url": "https://bugzilla.suse.com/1258256"
},
{
"category": "self",
"summary": "SUSE Bug 1258258",
"url": "https://bugzilla.suse.com/1258258"
},
{
"category": "self",
"summary": "SUSE Bug 1258259",
"url": "https://bugzilla.suse.com/1258259"
},
{
"category": "self",
"summary": "SUSE Bug 1258272",
"url": "https://bugzilla.suse.com/1258272"
},
{
"category": "self",
"summary": "SUSE Bug 1258273",
"url": "https://bugzilla.suse.com/1258273"
},
{
"category": "self",
"summary": "SUSE Bug 1258276",
"url": "https://bugzilla.suse.com/1258276"
},
{
"category": "self",
"summary": "SUSE Bug 1258277",
"url": "https://bugzilla.suse.com/1258277"
},
{
"category": "self",
"summary": "SUSE Bug 1258279",
"url": "https://bugzilla.suse.com/1258279"
},
{
"category": "self",
"summary": "SUSE Bug 1258286",
"url": "https://bugzilla.suse.com/1258286"
},
{
"category": "self",
"summary": "SUSE Bug 1258289",
"url": "https://bugzilla.suse.com/1258289"
},
{
"category": "self",
"summary": "SUSE Bug 1258290",
"url": "https://bugzilla.suse.com/1258290"
},
{
"category": "self",
"summary": "SUSE Bug 1258297",
"url": "https://bugzilla.suse.com/1258297"
},
{
"category": "self",
"summary": "SUSE Bug 1258298",
"url": "https://bugzilla.suse.com/1258298"
},
{
"category": "self",
"summary": "SUSE Bug 1258299",
"url": "https://bugzilla.suse.com/1258299"
},
{
"category": "self",
"summary": "SUSE Bug 1258303",
"url": "https://bugzilla.suse.com/1258303"
},
{
"category": "self",
"summary": "SUSE Bug 1258304",
"url": "https://bugzilla.suse.com/1258304"
},
{
"category": "self",
"summary": "SUSE Bug 1258308",
"url": "https://bugzilla.suse.com/1258308"
},
{
"category": "self",
"summary": "SUSE Bug 1258309",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "self",
"summary": "SUSE Bug 1258313",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "self",
"summary": "SUSE Bug 1258317",
"url": "https://bugzilla.suse.com/1258317"
},
{
"category": "self",
"summary": "SUSE Bug 1258321",
"url": "https://bugzilla.suse.com/1258321"
},
{
"category": "self",
"summary": "SUSE Bug 1258323",
"url": "https://bugzilla.suse.com/1258323"
},
{
"category": "self",
"summary": "SUSE Bug 1258324",
"url": "https://bugzilla.suse.com/1258324"
},
{
"category": "self",
"summary": "SUSE Bug 1258326",
"url": "https://bugzilla.suse.com/1258326"
},
{
"category": "self",
"summary": "SUSE Bug 1258331",
"url": "https://bugzilla.suse.com/1258331"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258349",
"url": "https://bugzilla.suse.com/1258349"
},
{
"category": "self",
"summary": "SUSE Bug 1258354",
"url": "https://bugzilla.suse.com/1258354"
},
{
"category": "self",
"summary": "SUSE Bug 1258355",
"url": "https://bugzilla.suse.com/1258355"
},
{
"category": "self",
"summary": "SUSE Bug 1258358",
"url": "https://bugzilla.suse.com/1258358"
},
{
"category": "self",
"summary": "SUSE Bug 1258374",
"url": "https://bugzilla.suse.com/1258374"
},
{
"category": "self",
"summary": "SUSE Bug 1258376",
"url": "https://bugzilla.suse.com/1258376"
},
{
"category": "self",
"summary": "SUSE Bug 1258377",
"url": "https://bugzilla.suse.com/1258377"
},
{
"category": "self",
"summary": "SUSE Bug 1258379",
"url": "https://bugzilla.suse.com/1258379"
},
{
"category": "self",
"summary": "SUSE Bug 1258389",
"url": "https://bugzilla.suse.com/1258389"
},
{
"category": "self",
"summary": "SUSE Bug 1258394",
"url": "https://bugzilla.suse.com/1258394"
},
{
"category": "self",
"summary": "SUSE Bug 1258395",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "self",
"summary": "SUSE Bug 1258397",
"url": "https://bugzilla.suse.com/1258397"
},
{
"category": "self",
"summary": "SUSE Bug 1258411",
"url": "https://bugzilla.suse.com/1258411"
},
{
"category": "self",
"summary": "SUSE Bug 1258415",
"url": "https://bugzilla.suse.com/1258415"
},
{
"category": "self",
"summary": "SUSE Bug 1258419",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "self",
"summary": "SUSE Bug 1258421",
"url": "https://bugzilla.suse.com/1258421"
},
{
"category": "self",
"summary": "SUSE Bug 1258422",
"url": "https://bugzilla.suse.com/1258422"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258429",
"url": "https://bugzilla.suse.com/1258429"
},
{
"category": "self",
"summary": "SUSE Bug 1258430",
"url": "https://bugzilla.suse.com/1258430"
},
{
"category": "self",
"summary": "SUSE Bug 1258442",
"url": "https://bugzilla.suse.com/1258442"
},
{
"category": "self",
"summary": "SUSE Bug 1258455",
"url": "https://bugzilla.suse.com/1258455"
},
{
"category": "self",
"summary": "SUSE Bug 1258461",
"url": "https://bugzilla.suse.com/1258461"
},
{
"category": "self",
"summary": "SUSE Bug 1258464",
"url": "https://bugzilla.suse.com/1258464"
},
{
"category": "self",
"summary": "SUSE Bug 1258465",
"url": "https://bugzilla.suse.com/1258465"
},
{
"category": "self",
"summary": "SUSE Bug 1258468",
"url": "https://bugzilla.suse.com/1258468"
},
{
"category": "self",
"summary": "SUSE Bug 1258469",
"url": "https://bugzilla.suse.com/1258469"
},
{
"category": "self",
"summary": "SUSE Bug 1258483",
"url": "https://bugzilla.suse.com/1258483"
},
{
"category": "self",
"summary": "SUSE Bug 1258484",
"url": "https://bugzilla.suse.com/1258484"
},
{
"category": "self",
"summary": "SUSE Bug 1258489",
"url": "https://bugzilla.suse.com/1258489"
},
{
"category": "self",
"summary": "SUSE Bug 1258517",
"url": "https://bugzilla.suse.com/1258517"
},
{
"category": "self",
"summary": "SUSE Bug 1258518",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "self",
"summary": "SUSE Bug 1258519",
"url": "https://bugzilla.suse.com/1258519"
},
{
"category": "self",
"summary": "SUSE Bug 1258520",
"url": "https://bugzilla.suse.com/1258520"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258544",
"url": "https://bugzilla.suse.com/1258544"
},
{
"category": "self",
"summary": "SUSE Bug 1258660",
"url": "https://bugzilla.suse.com/1258660"
},
{
"category": "self",
"summary": "SUSE Bug 1258672",
"url": "https://bugzilla.suse.com/1258672"
},
{
"category": "self",
"summary": "SUSE Bug 1258824",
"url": "https://bugzilla.suse.com/1258824"
},
{
"category": "self",
"summary": "SUSE Bug 1259329",
"url": "https://bugzilla.suse.com/1259329"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39753 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39964 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68292 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68295 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68329 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68371 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68371/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68745 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68785 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68810 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68818 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71125 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71182 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71184 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71191 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71193 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71195 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71222 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71225 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22979 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22980 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22998 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23010 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23017 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23018 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23022 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23022/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23023 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23024 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23026 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23030 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23031 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23033 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23037 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23038 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23042 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23047 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23049 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23050 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23053 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23054 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23055 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23056 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23057 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23058 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23059 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23060 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23061 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23062 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23063 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23064 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23065 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23066 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23068 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23069 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23070 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23071 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23073 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23076 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23078 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23080 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23082 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23083 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23084 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23085 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23086 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23088 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23089 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23090 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23091 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23094 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23095 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23096 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23097 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23099 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23100 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23101 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23102 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23104 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23105 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23107 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23108 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23110 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23112 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23116 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23119 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23121 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23123 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23128 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23129 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23131 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23135 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23136 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23137 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23141 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23142 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23145 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23146 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23148 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23150 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23151 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23152 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23154 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23155 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23156 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23157 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23158 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23161 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23163 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23166 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23167 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23169 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23170 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23171 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23172 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23173 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23176 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23177 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23178 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23179 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23182 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23188 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23189 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23190 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23191 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23198 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23208 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23209 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23210 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23213 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23214 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23223 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23224 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23230/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-03-25T08:48:43Z",
"generator": {
"date": "2026-03-25T08:48:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20838-1",
"initial_release_date": "2026-03-25T08:48:43Z",
"revision_history": [
{
"date": "2026-03-25T08:48:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.27.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.27.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.27.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.27.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.27.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.27.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.27.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.27.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.27.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.27.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.27.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.27.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.27.1.noarch",
"product_id": "kernel-source-6.12.0-160000.27.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.27.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.27.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.27.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.27.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.27.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.27.1.s390x",
"product_id": "kernel-default-6.12.0-160000.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.27.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.27.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.27.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.27.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.27.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.27.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"product_id": "kernel-rt-livepatch-6.12.0-160000.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.27.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.27.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.27.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.27.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.27.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.27.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.27.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.27.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.27.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.27.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.27.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.12.0-160000.27.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.27.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-39753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39753"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops\n\nClears up the warning added in 7ee3647243e5 (\"migrate: Remove call to\n-\u003ewritepage\") that occurs in various xfstests, causing \"something found\nin dmesg\" failures.\n\n[ 341.136573] gfs2_meta_aops does not implement migrate_folio\n[ 341.136953] WARNING: CPU: 1 PID: 36 at mm/migrate.c:944 move_to_new_folio+0x2f8/0x300",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39753",
"url": "https://www.suse.com/security/cve/CVE-2025-39753"
},
{
"category": "external",
"summary": "SUSE Bug 1249590 for CVE-2025-39753",
"url": "https://bugzilla.suse.com/1249590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-39753"
},
{
"cve": "CVE-2025-39964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - Disallow concurrent writes in af_alg_sendmsg\n\nIssuing two writes to the same af_alg socket is bogus as the\ndata will be interleaved in an unpredictable fashion. Furthermore,\nconcurrent writes may create inconsistencies in the internal\nsocket state.\n\nDisallow this by adding a new ctx-\u003ewrite field that indiciates\nexclusive ownership for writing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39964",
"url": "https://www.suse.com/security/cve/CVE-2025-39964"
},
{
"category": "external",
"summary": "SUSE Bug 1251966 for CVE-2025-39964",
"url": "https://bugzilla.suse.com/1251966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-39964"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: prevent poison consumption when splitting THP\n\nWhen performing memory error injection on a THP (Transparent Huge Page)\nmapped to userspace on an x86 server, the kernel panics with the following\ntrace. The expected behavior is to terminate the affected process instead\nof panicking the kernel, as the x86 Machine Check code can recover from an\nin-userspace #MC.\n\n mce: [Hardware Error]: CPU 0: Machine Check Exception: f Bank 3: bd80000000070134\n mce: [Hardware Error]: RIP 10:\u003cffffffff8372f8bc\u003e {memchr_inv+0x4c/0xf0}\n mce: [Hardware Error]: TSC afff7bbff88a ADDR 1d301b000 MISC 80 PPIN 1e741e77539027db\n mce: [Hardware Error]: PROCESSOR 0:d06d0 TIME 1758093249 SOCKET 0 APIC 0 microcode 80000320\n mce: [Hardware Error]: Run the above through \u0027mcelog --ascii\u0027\n mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel\n Kernel panic - not syncing: Fatal local machine check\n\nThe root cause of this panic is that handling a memory failure triggered\nby an in-userspace #MC necessitates splitting the THP. The splitting\nprocess employs a mechanism, implemented in\ntry_to_map_unused_to_zeropage(), which reads the pages in the THP to\nidentify zero-filled pages. However, reading the pages in the THP results\nin a second in-kernel #MC, occurring before the initial memory_failure()\ncompletes, ultimately leading to a kernel panic. See the kernel panic\ncall trace on the two #MCs.\n\n First Machine Check occurs // [1]\n memory_failure() // [2]\n try_to_split_thp_page()\n split_huge_page()\n split_huge_page_to_list_to_order()\n __folio_split() // [3]\n remap_page()\n remove_migration_ptes()\n remove_migration_pte()\n try_to_map_unused_to_zeropage() // [4]\n memchr_inv() // [5]\n Second Machine Check occurs // [6]\n Kernel panic\n\n[1] Triggered by accessing a hardware-poisoned THP in userspace, which is\n typically recoverable by terminating the affected process.\n\n[2] Call folio_set_has_hwpoisoned() before try_to_split_thp_page().\n\n[3] Pass the RMP_USE_SHARED_ZEROPAGE remap flag to remap_page().\n\n[4] Try to map the unused THP to zeropage.\n\n[5] Re-access pages in the hw-poisoned THP in the kernel.\n\n[6] Triggered in-kernel, leading to a panic kernel.\n\nIn Step[2], memory_failure() sets the poisoned flag on the page in the THP\nby TestSetPageHWPoison() before calling try_to_split_thp_page().\n\nAs suggested by David Hildenbrand, fix this panic by not accessing to the\npoisoned page in the THP during zeropage identification, while continuing\nto scan unaffected pages in the THP for possible zeropage mapping. This\nprevents a second in-kernel #MC that would cause kernel panic in Step[4].\n\nThanks to Andrew Zaborowski for his initial work on fixing this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40230",
"url": "https://www.suse.com/security/cve/CVE-2025-40230"
},
{
"category": "external",
"summary": "SUSE Bug 1254817 for CVE-2025-40230",
"url": "https://bugzilla.suse.com/1254817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-40230"
},
{
"cve": "CVE-2025-68173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix softlockup in ftrace_module_enable\n\nA soft lockup was observed when loading amdgpu module.\nIf a module has a lot of tracable functions, multiple calls\nto kallsyms_lookup can spend too much time in RCU critical\nsection and with disabled preemption, causing kernel panic.\nThis is the same issue that was fixed in\ncommit d0b24b4e91fc (\"ftrace: Prevent RCU stall on PREEMPT_VOLUNTARY\nkernels\") and commit 42ea22e754ba (\"ftrace: Add cond_resched() to\nftrace_graph_set_hash()\").\n\nFix it the same way by adding cond_resched() in ftrace_module_enable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68173",
"url": "https://www.suse.com/security/cve/CVE-2025-68173"
},
{
"category": "external",
"summary": "SUSE Bug 1255311 for CVE-2025-68173",
"url": "https://bugzilla.suse.com/1255311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68173"
},
{
"cve": "CVE-2025-68186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up\n\nThe function ring_buffer_map_get_reader() is a bit more strict than the\nother get reader functions, and except for certain situations the\nrb_get_reader_page() should not return NULL. If it does, it triggers a\nwarning.\n\nThis warning was triggering but after looking at why, it was because\nanother acceptable situation was happening and it wasn\u0027t checked for.\n\nIf the reader catches up to the writer and there\u0027s still data to be read\non the reader page, then the rb_get_reader_page() will return NULL as\nthere\u0027s no new page to get.\n\nIn this situation, the reader page should not be updated and no warning\nshould trigger.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68186",
"url": "https://www.suse.com/security/cve/CVE-2025-68186"
},
{
"category": "external",
"summary": "SUSE Bug 1255144 for CVE-2025-68186",
"url": "https://bugzilla.suse.com/1255144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68186"
},
{
"cve": "CVE-2025-68292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68292"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/memfd: fix information leak in hugetlb folios\n\nWhen allocating hugetlb folios for memfd, three initialization steps are\nmissing:\n\n1. Folios are not zeroed, leading to kernel memory disclosure to userspace\n2. Folios are not marked uptodate before adding to page cache\n3. hugetlb_fault_mutex is not taken before hugetlb_add_to_page_cache()\n\nThe memfd allocation path bypasses the normal page fault handler\n(hugetlb_no_page) which would handle all of these initialization steps. \nThis is problematic especially for udmabuf use cases where folios are\npinned and directly accessed by userspace via DMA.\n\nFix by matching the initialization pattern used in hugetlb_no_page():\n- Zero the folio using folio_zero_user() which is optimized for huge pages\n- Mark it uptodate with folio_mark_uptodate()\n- Take hugetlb_fault_mutex before adding to page cache to prevent races\n\nThe folio_zero_user() change also fixes a potential security issue where\nuninitialized kernel memory could be disclosed to userspace through read()\nor mmap() operations on the memfd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68292",
"url": "https://www.suse.com/security/cve/CVE-2025-68292"
},
{
"category": "external",
"summary": "SUSE Bug 1255148 for CVE-2025-68292",
"url": "https://bugzilla.suse.com/1255148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68292"
},
{
"cve": "CVE-2025-68295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix memory leak in cifs_construct_tcon()\n\nWhen having a multiuser mount with domain= specified and using\ncifscreds, cifs_set_cifscreds() will end up setting @ctx-\u003edomainname,\nso it needs to be freed before leaving cifs_construct_tcon().\n\nThis fixes the following memory leak reported by kmemleak:\n\n mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...\n su - testuser\n cifscreds add -d ZELDA -u testuser\n ...\n ls /mnt/1\n ...\n umount /mnt\n echo scan \u003e /sys/kernel/debug/kmemleak\n cat /sys/kernel/debug/kmemleak\n unreferenced object 0xffff8881203c3f08 (size 8):\n comm \"ls\", pid 5060, jiffies 4307222943\n hex dump (first 8 bytes):\n 5a 45 4c 44 41 00 cc cc ZELDA...\n backtrace (crc d109a8cf):\n __kmalloc_node_track_caller_noprof+0x572/0x710\n kstrdup+0x3a/0x70\n cifs_sb_tlink+0x1209/0x1770 [cifs]\n cifs_get_fattr+0xe1/0xf50 [cifs]\n cifs_get_inode_info+0xb5/0x240 [cifs]\n cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]\n cifs_getattr+0x28e/0x450 [cifs]\n vfs_getattr_nosec+0x126/0x180\n vfs_statx+0xf6/0x220\n do_statx+0xab/0x110\n __x64_sys_statx+0xd5/0x130\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68295",
"url": "https://www.suse.com/security/cve/CVE-2025-68295"
},
{
"category": "external",
"summary": "SUSE Bug 1255129 for CVE-2025-68295",
"url": "https://bugzilla.suse.com/1255129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68295"
},
{
"cve": "CVE-2025-68329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68329"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs\n\nWhen a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel\ncalls vm_ops-\u003eclose on each portion. For trace buffer mappings, this\nresults in ring_buffer_unmap() being called multiple times while\nring_buffer_map() was only called once.\n\nThis causes ring_buffer_unmap() to return -ENODEV on subsequent calls\nbecause user_mapped is already 0, triggering a WARN_ON.\n\nTrace buffer mappings cannot support partial mappings because the ring\nbuffer structure requires the complete buffer including the meta page.\n\nFix this by adding a may_split callback that returns -EINVAL to prevent\nVMA splits entirely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68329",
"url": "https://www.suse.com/security/cve/CVE-2025-68329"
},
{
"category": "external",
"summary": "SUSE Bug 1255490 for CVE-2025-68329",
"url": "https://bugzilla.suse.com/1255490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68329"
},
{
"cve": "CVE-2025-68371",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68371"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: smartpqi: Fix device resources accessed after device removal\n\nCorrect possible race conditions during device removal.\n\nPreviously, a scheduled work item to reset a LUN could still execute\nafter the device was removed, leading to use-after-free and other\nresource access issues.\n\nThis race condition occurs because the abort handler may schedule a LUN\nreset concurrently with device removal via sdev_destroy(), leading to\nuse-after-free and improper access to freed resources.\n\n - Check in the device reset handler if the device is still present in\n the controller\u0027s SCSI device list before running; if not, the reset\n is skipped.\n\n - Cancel any pending TMF work that has not started in sdev_destroy().\n\n - Ensure device freeing in sdev_destroy() is done while holding the\n LUN reset mutex to avoid races with ongoing resets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68371",
"url": "https://www.suse.com/security/cve/CVE-2025-68371"
},
{
"category": "external",
"summary": "SUSE Bug 1255572 for CVE-2025-68371",
"url": "https://bugzilla.suse.com/1255572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68371"
},
{
"cve": "CVE-2025-68745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68745"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Clear cmds after chip reset\n\nCommit aefed3e5548f (\"scsi: qla2xxx: target: Fix offline port handling\nand host reset handling\") caused two problems:\n\n1. Commands sent to FW, after chip reset got stuck and never freed as FW\n is not going to respond to them anymore.\n\n2. BUG_ON(cmd-\u003esg_mapped) in qlt_free_cmd(). Commit 26f9ce53817a\n (\"scsi: qla2xxx: Fix missed DMA unmap for aborted commands\")\n attempted to fix this, but introduced another bug under different\n circumstances when two different CPUs were racing to call\n qlt_unmap_sg() at the same time: BUG_ON(!valid_dma_direction(dir)) in\n dma_unmap_sg_attrs().\n\nSo revert \"scsi: qla2xxx: Fix missed DMA unmap for aborted commands\" and\npartially revert \"scsi: qla2xxx: target: Fix offline port handling and\nhost reset handling\" at __qla2x00_abort_all_cmds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68745",
"url": "https://www.suse.com/security/cve/CVE-2025-68745"
},
{
"category": "external",
"summary": "SUSE Bug 1255721 for CVE-2025-68745",
"url": "https://bugzilla.suse.com/1255721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68745"
},
{
"cve": "CVE-2025-68785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68785"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix middle attribute validation in push_nsh() action\n\nThe push_nsh() action structure looks like this:\n\n OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))\n\nThe outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK\u0027ed by the\nnla_for_each_nested() inside __ovs_nla_copy_actions(). The innermost\nOVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK\u0027ed by the nla_for_each_nested()\ninside nsh_key_put_from_nlattr(). But nothing checks if the attribute\nin the middle is OK. We don\u0027t even check that this attribute is the\nOVS_KEY_ATTR_NSH. We just do a double unwrap with a pair of nla_data()\ncalls - first time directly while calling validate_push_nsh() and the\nsecond time as part of the nla_for_each_nested() macro, which isn\u0027t\nsafe, potentially causing invalid memory access if the size of this\nattribute is incorrect. The failure may not be noticed during\nvalidation due to larger netlink buffer, but cause trouble later during\naction execution where the buffer is allocated exactly to the size:\n\n BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n Read of size 184 at addr ffff88816459a634 by task a.out/22624\n\n CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x2c/0x390\n kasan_report+0xdd/0x110\n kasan_check_range+0x35/0x1b0\n __asan_memcpy+0x20/0x60\n nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n push_nsh+0x82/0x120 [openvswitch]\n do_execute_actions+0x1405/0x2840 [openvswitch]\n ovs_execute_actions+0xd5/0x3b0 [openvswitch]\n ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]\n genl_family_rcv_msg_doit+0x1d6/0x2b0\n genl_family_rcv_msg+0x336/0x580\n genl_rcv_msg+0x9f/0x130\n netlink_rcv_skb+0x11f/0x370\n genl_rcv+0x24/0x40\n netlink_unicast+0x73e/0xaa0\n netlink_sendmsg+0x744/0xbf0\n __sys_sendto+0x3d6/0x450\n do_syscall_64+0x79/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nLet\u0027s add some checks that the attribute is properly sized and it\u0027s\nthe only one attribute inside the action. Technically, there is no\nreal reason for OVS_KEY_ATTR_NSH to be there, as we know that we\u0027re\npushing an NSH header already, it just creates extra nesting, but\nthat\u0027s how uAPI works today. So, keeping as it is.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68785",
"url": "https://www.suse.com/security/cve/CVE-2025-68785"
},
{
"category": "external",
"summary": "SUSE Bug 1256640 for CVE-2025-68785",
"url": "https://bugzilla.suse.com/1256640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot\n\nReject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was\ninitially created with a guest_memfd binding, as KVM doesn\u0027t support\ntoggling KVM_MEM_GUEST_MEMFD on existing memslots. KVM prevents enabling\nKVM_MEM_GUEST_MEMFD, but doesn\u0027t prevent clearing the flag.\n\nFailure to reject the new memslot results in a use-after-free due to KVM\nnot unbinding from the guest_memfd instance. Unbinding on a FLAGS_ONLY\nchange is easy enough, and can/will be done as a hardening measure (in\nanticipation of KVM supporting dirty logging on guest_memfd at some point),\nbut fixing the use-after-free would only address the immediate symptom.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]\n Write of size 8 at addr ffff8881111ae908 by task repro/745\n\n CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x60\n print_report+0xcb/0x5c0\n kasan_report+0xb4/0xe0\n kvm_gmem_release+0x362/0x400 [kvm]\n __fput+0x2fa/0x9d0\n task_work_run+0x12c/0x200\n do_exit+0x6ae/0x2100\n do_group_exit+0xa8/0x230\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0x737/0x740\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f581f2eac31\n \u003c/TASK\u003e\n\n Allocated by task 745 on cpu 6 at 9.746971s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_kmalloc+0x77/0x90\n kvm_set_memory_region.part.0+0x652/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n Freed by task 745 on cpu 6 at 9.747467s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_save_free_info+0x37/0x50\n __kasan_slab_free+0x3b/0x60\n kfree+0xf5/0x440\n kvm_set_memslot+0x3c2/0x1160 [kvm]\n kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68810",
"url": "https://www.suse.com/security/cve/CVE-2025-68810"
},
{
"category": "external",
"summary": "SUSE Bug 1256679 for CVE-2025-68810",
"url": "https://bugzilla.suse.com/1256679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-68818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68818"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: Revert \"scsi: qla2xxx: Perform lockless command completion in abort path\"\n\nThis reverts commit 0367076b0817d5c75dfb83001ce7ce5c64d803a9.\n\nThe commit being reverted added code to __qla2x00_abort_all_cmds() to\ncall sp-\u003edone() without holding a spinlock. But unlike the older code\nbelow it, this new code failed to check sp-\u003ecmd_type and just assumed\nTYPE_SRB, which results in a jump to an invalid pointer in target-mode\nwith TYPE_TGT_CMD:\n\nqla2xxx [0000:65:00.0]-d034:8: qla24xx_do_nack_work create sess success\n 0000000009f7a79b\nqla2xxx [0000:65:00.0]-5003:8: ISP System Error - mbx1=1ff5h mbx2=10h\n mbx3=0h mbx4=0h mbx5=191h mbx6=0h mbx7=0h.\nqla2xxx [0000:65:00.0]-d01e:8: -\u003e fwdump no buffer\nqla2xxx [0000:65:00.0]-f03a:8: qla_target(0): System error async event\n 0x8002 occurred\nqla2xxx [0000:65:00.0]-00af:8: Performing ISP error recovery -\n ha=0000000058183fda.\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPF: supervisor instruction fetch in kernel mode\nPF: error_code(0x0010) - not-present page\nPGD 0 P4D 0\nOops: 0010 [#1] SMP\nCPU: 2 PID: 9446 Comm: qla2xxx_8_dpc Tainted: G O 6.1.133 #1\nHardware name: Supermicro Super Server/X11SPL-F, BIOS 4.2 12/15/2023\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at 0xffffffffffffffd6.\nRSP: 0018:ffffc90001f93dc8 EFLAGS: 00010206\nRAX: 0000000000000282 RBX: 0000000000000355 RCX: ffff88810d16a000\nRDX: ffff88810dbadaa8 RSI: 0000000000080000 RDI: ffff888169dc38c0\nRBP: ffff888169dc38c0 R08: 0000000000000001 R09: 0000000000000045\nR10: ffffffffa034bdf0 R11: 0000000000000000 R12: ffff88810800bb40\nR13: 0000000000001aa8 R14: ffff888100136610 R15: ffff8881070f7400\nFS: 0000000000000000(0000) GS:ffff88bf80080000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffffffffd6 CR3: 000000010c8ff006 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x4d/0x8b\n ? page_fault_oops+0x91/0x180\n ? trace_buffer_unlock_commit_regs+0x38/0x1a0\n ? exc_page_fault+0x391/0x5e0\n ? asm_exc_page_fault+0x22/0x30\n __qla2x00_abort_all_cmds+0xcb/0x3e0 [qla2xxx_scst]\n qla2x00_abort_all_cmds+0x50/0x70 [qla2xxx_scst]\n qla2x00_abort_isp_cleanup+0x3b7/0x4b0 [qla2xxx_scst]\n qla2x00_abort_isp+0xfd/0x860 [qla2xxx_scst]\n qla2x00_do_dpc+0x581/0xa40 [qla2xxx_scst]\n kthread+0xa8/0xd0\n \u003c/TASK\u003e\n\nThen commit 4475afa2646d (\"scsi: qla2xxx: Complete command early within\nlock\") added the spinlock back, because not having the lock caused a\nrace and a crash. But qla2x00_abort_srb() in the switch below already\nchecks for qla2x00_chip_is_down() and handles it the same way, so the\ncode above the switch is now redundant and still buggy in target-mode.\nRemove it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68818",
"url": "https://www.suse.com/security/cve/CVE-2025-68818"
},
{
"category": "external",
"summary": "SUSE Bug 1256675 for CVE-2025-68818",
"url": "https://bugzilla.suse.com/1256675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-68818"
},
{
"cve": "CVE-2025-71071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/mediatek: fix use-after-free on probe deferral\n\nThe driver is dropping the references taken to the larb devices during\nprobe after successful lookup as well as on errors. This can\npotentially lead to a use-after-free in case a larb device has not yet\nbeen bound to its driver so that the iommu driver probe defers.\n\nFix this by keeping the references as expected while the iommu driver is\nbound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71071",
"url": "https://www.suse.com/security/cve/CVE-2025-71071"
},
{
"category": "external",
"summary": "SUSE Bug 1256802 for CVE-2025-71071",
"url": "https://bugzilla.suse.com/1256802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer\n\nWhen advancing the target expiration for the guest\u0027s APIC timer in periodic\nmode, set the expiration to \"now\" if the target expiration is in the past\n(similar to what is done in update_target_expiration()). Blindly adding\nthe period to the previous target expiration can result in KVM generating\na practically unbounded number of hrtimer IRQs due to programming an\nexpired timer over and over. In extreme scenarios, e.g. if userspace\npauses/suspends a VM for an extended duration, this can even cause hard\nlockups in the host.\n\nCurrently, the bug only affects Intel CPUs when using the hypervisor timer\n(HV timer), a.k.a. the VMX preemption timer. Unlike the software timer,\na.k.a. hrtimer, which KVM keeps running even on exits to userspace, the\nHV timer only runs while the guest is active. As a result, if the vCPU\ndoes not run for an extended duration, there will be a huge gap between\nthe target expiration and the current time the vCPU resumes running.\nBecause the target expiration is incremented by only one period on each\ntimer expiration, this leads to a series of timer expirations occurring\nrapidly after the vCPU/VM resumes.\n\nMore critically, when the vCPU first triggers a periodic HV timer\nexpiration after resuming, advancing the expiration by only one period\nwill result in a target expiration in the past. As a result, the delta\nmay be calculated as a negative value. When the delta is converted into\nan absolute value (tscdeadline is an unsigned u64), the resulting value\ncan overflow what the HV timer is capable of programming. I.e. the large\nvalue will exceed the VMX Preemption Timer\u0027s maximum bit width of\ncpu_preemption_timer_multi + 32, and thus cause KVM to switch from the\nHV timer to the software timer (hrtimers).\n\nAfter switching to the software timer, periodic timer expiration callbacks\nmay be executed consecutively within a single clock interrupt handler,\nbecause hrtimers honors KVM\u0027s request for an expiration in the past and\nimmediately re-invokes KVM\u0027s callback after reprogramming. And because\nthe interrupt handler runs with IRQs disabled, restarting KVM\u0027s hrtimer\nover and over until the target expiration is advanced to \"now\" can result\nin a hard lockup.\n\nE.g. the following hard lockup was triggered in the host when running a\nWindows VM (only relevant because it used the APIC timer in periodic mode)\nafter resuming the VM from a long suspend (in the host).\n\n NMI watchdog: Watchdog detected hard LOCKUP on cpu 45\n ...\n RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]\n ...\n RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046\n RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc\n RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500\n RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0\n R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0\n R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8\n FS: 00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0\n PKRU: 55555554\n Call Trace:\n \u003cIRQ\u003e\n apic_timer_fn+0x31/0x50 [kvm]\n __hrtimer_run_queues+0x100/0x280\n hrtimer_interrupt+0x100/0x210\n ? ttwu_do_wakeup+0x19/0x160\n smp_apic_timer_interrupt+0x6a/0x130\n apic_timer_interrupt+0xf/0x20\n \u003c/IRQ\u003e\n\nMoreover, if the suspend duration of the virtual machine is not long enough\nto trigger a hard lockup in this scenario, since commit 98c25ead5eda\n(\"KVM: VMX: Move preemption timer \u003c=\u003e hrtimer dance to common x86\"), KVM\nwill continue using the software timer until the guest reprograms the APIC\ntimer in some way. Since the periodic timer does not require frequent APIC\ntimer register programming, the guest may continue to use the software\ntimer in \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71104",
"url": "https://www.suse.com/security/cve/CVE-2025-71104"
},
{
"category": "external",
"summary": "SUSE Bug 1256708 for CVE-2025-71104",
"url": "https://bugzilla.suse.com/1256708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71104"
},
{
"cve": "CVE-2025-71125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Do not register unsupported perf events\n\nSynthetic events currently do not have a function to register perf events.\nThis leads to calling the tracepoint register functions with a NULL\nfunction pointer which triggers:\n\n ------------[ cut here ]------------\n WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:tracepoint_add_func+0x357/0x370\n Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc \u003c0f\u003e 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f\n RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246\n RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000\n RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8\n RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780\n R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a\n R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78\n FS: 00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n tracepoint_probe_register+0x5d/0x90\n synth_event_reg+0x3c/0x60\n perf_trace_event_init+0x204/0x340\n perf_trace_init+0x85/0xd0\n perf_tp_event_init+0x2e/0x50\n perf_try_init_event+0x6f/0x230\n ? perf_event_alloc+0x4bb/0xdc0\n perf_event_alloc+0x65a/0xdc0\n __se_sys_perf_event_open+0x290/0x9f0\n do_syscall_64+0x93/0x7b0\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n ? trace_hardirqs_off+0x53/0xc0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nInstead, have the code return -ENODEV, which doesn\u0027t warn and has perf\nerror out with:\n\n # perf record -e synthetic:futex_wait\nError:\nThe sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).\n\"dmesg | grep -i perf\" may provide additional information.\n\nIdeally perf should support synthetic events, but for now just fix the\nwarning. The support can come later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71125",
"url": "https://www.suse.com/security/cve/CVE-2025-71125"
},
{
"category": "external",
"summary": "SUSE Bug 1256784 for CVE-2025-71125",
"url": "https://bugzilla.suse.com/1256784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2025-71125"
},
{
"cve": "CVE-2025-71134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/page_alloc: change all pageblocks migrate type on coalescing\n\nWhen a page is freed it coalesces with a buddy into a higher order page\nwhile possible. When the buddy page migrate type differs, it is expected\nto be updated to match the one of the page being freed.\n\nHowever, only the first pageblock of the buddy page is updated, while the\nrest of the pageblocks are left unchanged.\n\nThat causes warnings in later expand() and other code paths (like below),\nsince an inconsistency between migration type of the list containing the\npage and the page-owned pageblocks migration types is introduced.\n\n[ 308.986589] ------------[ cut here ]------------\n[ 308.987227] page type is 0, passed migratetype is 1 (nr=256)\n[ 308.987275] WARNING: CPU: 1 PID: 5224 at mm/page_alloc.c:812 expand+0x23c/0x270\n[ 308.987293] Modules linked in: algif_hash(E) af_alg(E) nft_fib_inet(E) nft_fib_ipv4(E) nft_fib_ipv6(E) nft_fib(E) nft_reject_inet(E) nf_reject_ipv4(E) nf_reject_ipv6(E) nft_reject(E) nft_ct(E) nft_chain_nat(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) nf_tables(E) s390_trng(E) vfio_ccw(E) mdev(E) vfio_iommu_type1(E) vfio(E) sch_fq_codel(E) drm(E) i2c_core(E) drm_panel_orientation_quirks(E) loop(E) nfnetlink(E) vsock_loopback(E) vmw_vsock_virtio_transport_common(E) vsock(E) ctcm(E) fsm(E) diag288_wdt(E) watchdog(E) zfcp(E) scsi_transport_fc(E) ghash_s390(E) prng(E) aes_s390(E) des_generic(E) des_s390(E) libdes(E) sha3_512_s390(E) sha3_256_s390(E) sha_common(E) paes_s390(E) crypto_engine(E) pkey_cca(E) pkey_ep11(E) zcrypt(E) rng_core(E) pkey_pckmo(E) pkey(E) autofs4(E)\n[ 308.987439] Unloaded tainted modules: hmac_s390(E):2\n[ 308.987650] CPU: 1 UID: 0 PID: 5224 Comm: mempig_verify Kdump: loaded Tainted: G E 6.18.0-gcc-bpf-debug #431 PREEMPT\n[ 308.987657] Tainted: [E]=UNSIGNED_MODULE\n[ 308.987661] Hardware name: IBM 3906 M04 704 (z/VM 7.3.0)\n[ 308.987666] Krnl PSW : 0404f00180000000 00000349976fa600 (expand+0x240/0x270)\n[ 308.987676] R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3\n[ 308.987682] Krnl GPRS: 0000034980000004 0000000000000005 0000000000000030 000003499a0e6d88\n[ 308.987688] 0000000000000005 0000034980000005 000002be803ac000 0000023efe6c8300\n[ 308.987692] 0000000000000008 0000034998d57290 000002be00000100 0000023e00000008\n[ 308.987696] 0000000000000000 0000000000000000 00000349976fa5fc 000002c99b1eb6f0\n[ 308.987708] Krnl Code: 00000349976fa5f0: c020008a02f2\tlarl\t%r2,000003499883abd4\n 00000349976fa5f6: c0e5ffe3f4b5\tbrasl\t%r14,0000034997378f60\n #00000349976fa5fc: af000000\t\tmc\t0,0\n \u003e00000349976fa600: a7f4ff4c\t\tbrc\t15,00000349976fa498\n 00000349976fa604: b9040026\t\tlgr\t%r2,%r6\n 00000349976fa608: c0300088317f\tlarl\t%r3,0000034998800906\n 00000349976fa60e: c0e5fffdb6e1\tbrasl\t%r14,00000349976b13d0\n 00000349976fa614: af000000\t\tmc\t0,0\n[ 308.987734] Call Trace:\n[ 308.987738] [\u003c00000349976fa600\u003e] expand+0x240/0x270\n[ 308.987744] ([\u003c00000349976fa5fc\u003e] expand+0x23c/0x270)\n[ 308.987749] [\u003c00000349976ff95e\u003e] rmqueue_bulk+0x71e/0x940\n[ 308.987754] [\u003c00000349976ffd7e\u003e] __rmqueue_pcplist+0x1fe/0x2a0\n[ 308.987759] [\u003c0000034997700966\u003e] rmqueue.isra.0+0xb46/0xf40\n[ 308.987763] [\u003c0000034997703ec8\u003e] get_page_from_freelist+0x198/0x8d0\n[ 308.987768] [\u003c0000034997706fa8\u003e] __alloc_frozen_pages_noprof+0x198/0x400\n[ 308.987774] [\u003c00000349977536f8\u003e] alloc_pages_mpol+0xb8/0x220\n[ 308.987781] [\u003c0000034997753bf6\u003e] folio_alloc_mpol_noprof+0x26/0xc0\n[ 308.987786] [\u003c0000034997753e4c\u003e] vma_alloc_folio_noprof+0x6c/0xa0\n[ 308.987791] [\u003c0000034997775b22\u003e] vma_alloc_anon_folio_pmd+0x42/0x240\n[ 308.987799] [\u003c000003499777bfea\u003e] __do_huge_pmd_anonymous_page+0x3a/0x210\n[ 308.987804] [\u003c00000349976cb0\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71134",
"url": "https://www.suse.com/security/cve/CVE-2025-71134"
},
{
"category": "external",
"summary": "SUSE Bug 1256732 for CVE-2025-71134",
"url": "https://bugzilla.suse.com/1256732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71134"
},
{
"cve": "CVE-2025-71161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm-verity: disable recursive forward error correction\n\nThere are two problems with the recursive correction:\n\n1. It may cause denial-of-service. In fec_read_bufs, there is a loop that\nhas 253 iterations. For each iteration, we may call verity_hash_for_block\nrecursively. There is a limit of 4 nested recursions - that means that\nthere may be at most 253^4 (4 billion) iterations. Red Hat QE team\nactually created an image that pushes dm-verity to this limit - and this\nimage just makes the udev-worker process get stuck in the \u0027D\u0027 state.\n\n2. It doesn\u0027t work. In fec_read_bufs we store data into the variable\n\"fio-\u003ebufs\", but fio bufs is shared between recursive invocations, if\n\"verity_hash_for_block\" invoked correction recursively, it would\noverwrite partially filled fio-\u003ebufs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71161",
"url": "https://www.suse.com/security/cve/CVE-2025-71161"
},
{
"category": "external",
"summary": "SUSE Bug 1257174 for CVE-2025-71161",
"url": "https://bugzilla.suse.com/1257174"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71161"
},
{
"cve": "CVE-2025-71182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: make j1939_session_activate() fail if device is no longer registered\n\nsyzbot is still reporting\n\n unregister_netdevice: waiting for vcan0 to become free. Usage count = 2\n\neven after commit 93a27b5891b8 (\"can: j1939: add missing calls in\nNETDEV_UNREGISTER notification handler\") was added. A debug printk() patch\nfound that j1939_session_activate() can succeed even after\nj1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)\nhas completed.\n\nSince j1939_cancel_active_session() is processed with the session list lock\nheld, checking ndev-\u003ereg_state in j1939_session_activate() with the session\nlist lock held can reliably close the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71182",
"url": "https://www.suse.com/security/cve/CVE-2025-71182"
},
{
"category": "external",
"summary": "SUSE Bug 1257586 for CVE-2025-71182",
"url": "https://bugzilla.suse.com/1257586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71182"
},
{
"cve": "CVE-2025-71183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: always detect conflicting inodes when logging inode refs\n\nAfter rename exchanging (either with the rename exchange operation or\nregular renames in multiple non-atomic steps) two inodes and at least\none of them is a directory, we can end up with a log tree that contains\nonly of the inodes and after a power failure that can result in an attempt\nto delete the other inode when it should not because it was not deleted\nbefore the power failure. In some case that delete attempt fails when\nthe target inode is a directory that contains a subvolume inside it, since\nthe log replay code is not prepared to deal with directory entries that\npoint to root items (only inode items).\n\n1) We have directories \"dir1\" (inode A) and \"dir2\" (inode B) under the\n same parent directory;\n\n2) We have a file (inode C) under directory \"dir1\" (inode A);\n\n3) We have a subvolume inside directory \"dir2\" (inode B);\n\n4) All these inodes were persisted in a past transaction and we are\n currently at transaction N;\n\n5) We rename the file (inode C), so at btrfs_log_new_name() we update\n inode C\u0027s last_unlink_trans to N;\n\n6) We get a rename exchange for \"dir1\" (inode A) and \"dir2\" (inode B),\n so after the exchange \"dir1\" is inode B and \"dir2\" is inode A.\n During the rename exchange we call btrfs_log_new_name() for inodes\n A and B, but because they are directories, we don\u0027t update their\n last_unlink_trans to N;\n\n7) An fsync against the file (inode C) is done, and because its inode\n has a last_unlink_trans with a value of N we log its parent directory\n (inode A) (through btrfs_log_all_parents(), called from\n btrfs_log_inode_parent()).\n\n8) So we end up with inode B not logged, which now has the old name\n of inode A. At copy_inode_items_to_log(), when logging inode A, we\n did not check if we had any conflicting inode to log because inode\n A has a generation lower than the current transaction (created in\n a past transaction);\n\n9) After a power failure, when replaying the log tree, since we find that\n inode A has a new name that conflicts with the name of inode B in the\n fs tree, we attempt to delete inode B... this is wrong since that\n directory was never deleted before the power failure, and because there\n is a subvolume inside that directory, attempting to delete it will fail\n since replay_dir_deletes() and btrfs_unlink_inode() are not prepared\n to deal with dir items that point to roots instead of inodes.\n\n When that happens the mount fails and we get a stack trace like the\n following:\n\n [87.2314] BTRFS info (device dm-0): start tree-log replay\n [87.2318] BTRFS critical (device dm-0): failed to delete reference to subvol, root 5 inode 256 parent 259\n [87.2332] ------------[ cut here ]------------\n [87.2338] BTRFS: Transaction aborted (error -2)\n [87.2346] WARNING: CPU: 1 PID: 638968 at fs/btrfs/inode.c:4345 __btrfs_unlink_inode+0x416/0x440 [btrfs]\n [87.2368] Modules linked in: btrfs loop dm_thin_pool (...)\n [87.2470] CPU: 1 UID: 0 PID: 638968 Comm: mount Tainted: G W 6.18.0-rc7-btrfs-next-218+ #2 PREEMPT(full)\n [87.2489] Tainted: [W]=WARN\n [87.2494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\n [87.2514] RIP: 0010:__btrfs_unlink_inode+0x416/0x440 [btrfs]\n [87.2538] Code: c0 89 04 24 (...)\n [87.2568] RSP: 0018:ffffc0e741f4b9b8 EFLAGS: 00010286\n [87.2574] RAX: 0000000000000000 RBX: ffff9d3ec8a6cf60 RCX: 0000000000000000\n [87.2582] RDX: 0000000000000002 RSI: ffffffff84ab45a1 RDI: 00000000ffffffff\n [87.2591] RBP: ffff9d3ec8a6ef20 R08: 0000000000000000 R09: ffffc0e741f4b840\n [87.2599] R10: ffff9d45dc1fffa8 R11: 0000000000000003 R12: ffff9d3ee26d77e0\n [87.2608] R13: ffffc0e741f4ba98 R14: ffff9d4458040800 R15: ffff9d44b6b7ca10\n [87.2618] FS: 00007f7b9603a840(0000) GS:ffff9d4658982000(0000) knlGS:0000000000000000\n [87.\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71183",
"url": "https://www.suse.com/security/cve/CVE-2025-71183"
},
{
"category": "external",
"summary": "SUSE Bug 1257631 for CVE-2025-71183",
"url": "https://bugzilla.suse.com/1257631"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71183"
},
{
"cve": "CVE-2025-71184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71184"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix NULL dereference on root when tracing inode eviction\n\nWhen evicting an inode the first thing we do is to setup tracing for it,\nwhich implies fetching the root\u0027s id. But in btrfs_evict_inode() the\nroot might be NULL, as implied in the next check that we do in\nbtrfs_evict_inode().\n\nHence, we either should set the -\u003eroot_objectid to 0 in case the root is\nNULL, or we move tracing setup after checking that the root is not\nNULL. Setting the rootid to 0 at least gives us the possibility to trace\nthis call even in the case when the root is NULL, so that\u0027s the solution\ntaken here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71184",
"url": "https://www.suse.com/security/cve/CVE-2025-71184"
},
{
"category": "external",
"summary": "SUSE Bug 1257635 for CVE-2025-71184",
"url": "https://bugzilla.suse.com/1257635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71184"
},
{
"cve": "CVE-2025-71185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: dma-crossbar: fix device leak on am335x route allocation\n\nMake sure to drop the reference taken when looking up the crossbar\nplatform device during am335x route allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71185",
"url": "https://www.suse.com/security/cve/CVE-2025-71185"
},
{
"category": "external",
"summary": "SUSE Bug 1257560 for CVE-2025-71185",
"url": "https://bugzilla.suse.com/1257560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71185"
},
{
"cve": "CVE-2025-71186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: stm32: dmamux: fix device leak on route allocation\n\nMake sure to drop the reference taken when looking up the DMA mux\nplatform device during route allocation.\n\nNote that holding a reference to a device does not prevent its driver\ndata from going away so there is no point in keeping the reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71186",
"url": "https://www.suse.com/security/cve/CVE-2025-71186"
},
{
"category": "external",
"summary": "SUSE Bug 1257565 for CVE-2025-71186",
"url": "https://bugzilla.suse.com/1257565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71186"
},
{
"cve": "CVE-2025-71188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: lpc18xx-dmamux: fix device leak on route allocation\n\nMake sure to drop the reference taken when looking up the DMA mux\nplatform device during route allocation.\n\nNote that holding a reference to a device does not prevent its driver\ndata from going away so there is no point in keeping the reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71188",
"url": "https://www.suse.com/security/cve/CVE-2025-71188"
},
{
"category": "external",
"summary": "SUSE Bug 1257576 for CVE-2025-71188",
"url": "https://bugzilla.suse.com/1257576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71188"
},
{
"cve": "CVE-2025-71189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw: dmamux: fix OF node leak on route allocation failure\n\nMake sure to drop the reference taken to the DMA master OF node also on\nlate route allocation failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71189",
"url": "https://www.suse.com/security/cve/CVE-2025-71189"
},
{
"category": "external",
"summary": "SUSE Bug 1257573 for CVE-2025-71189",
"url": "https://bugzilla.suse.com/1257573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2025-71189"
},
{
"cve": "CVE-2025-71190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: bcm-sba-raid: fix device leak on probe\n\nMake sure to drop the reference taken when looking up the mailbox device\nduring probe on probe failures and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71190",
"url": "https://www.suse.com/security/cve/CVE-2025-71190"
},
{
"category": "external",
"summary": "SUSE Bug 1257580 for CVE-2025-71190",
"url": "https://bugzilla.suse.com/1257580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2025-71190"
},
{
"cve": "CVE-2025-71191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_hdmac: fix device leak on of_dma_xlate()\n\nMake sure to drop the reference taken when looking up the DMA platform\ndevice during of_dma_xlate() when releasing channel resources.\n\nNote that commit 3832b78b3ec2 (\"dmaengine: at_hdmac: add missing\nput_device() call in at_dma_xlate()\") fixed the leak in a couple of\nerror paths but the reference is still leaking on successful allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71191",
"url": "https://www.suse.com/security/cve/CVE-2025-71191"
},
{
"category": "external",
"summary": "SUSE Bug 1257579 for CVE-2025-71191",
"url": "https://bugzilla.suse.com/1257579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2025-71191"
},
{
"cve": "CVE-2025-71192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ac97: fix a double free in snd_ac97_controller_register()\n\nIf ac97_add_adapter() fails, put_device() is the correct way to drop\nthe device reference. kfree() is not required.\nAdd kfree() if idr_alloc() fails and in ac97_adapter_release() to do\nthe cleanup.\n\nFound by code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71192",
"url": "https://www.suse.com/security/cve/CVE-2025-71192"
},
{
"category": "external",
"summary": "SUSE Bug 1257679 for CVE-2025-71192",
"url": "https://bugzilla.suse.com/1257679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71192"
},
{
"cve": "CVE-2025-71193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71193"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: qcom-qusb2: Fix NULL pointer dereference on early suspend\n\nEnabling runtime PM before attaching the QPHY instance as driver data\ncan lead to a NULL pointer dereference in runtime PM callbacks that\nexpect valid driver data. There is a small window where the suspend\ncallback may run after PM runtime enabling and before runtime forbid.\nThis causes a sporadic crash during boot:\n\n```\nUnable to handle kernel NULL pointer dereference at virtual address 00000000000000a1\n[...]\nCPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.7+ #116 PREEMPT\nWorkqueue: pm pm_runtime_work\npstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : qusb2_phy_runtime_suspend+0x14/0x1e0 [phy_qcom_qusb2]\nlr : pm_generic_runtime_suspend+0x2c/0x44\n[...]\n```\n\nAttach the QPHY instance as driver data before enabling runtime PM to\nprevent NULL pointer dereference in runtime PM callbacks.\n\nReorder pm_runtime_enable() and pm_runtime_forbid() to prevent a\nshort window where an unnecessary runtime suspend can occur.\n\nUse the devres-managed version to ensure PM runtime is symmetrically\ndisabled during driver removal for proper cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71193",
"url": "https://www.suse.com/security/cve/CVE-2025-71193"
},
{
"category": "external",
"summary": "SUSE Bug 1257686 for CVE-2025-71193",
"url": "https://bugzilla.suse.com/1257686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71193"
},
{
"cve": "CVE-2025-71194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock in wait_current_trans() due to ignored transaction type\n\nWhen wait_current_trans() is called during start_transaction(), it\ncurrently waits for a blocked transaction without considering whether\nthe given transaction type actually needs to wait for that particular\ntransaction state. The btrfs_blocked_trans_types[] array already defines\nwhich transaction types should wait for which transaction states, but\nthis check was missing in wait_current_trans().\n\nThis can lead to a deadlock scenario involving two transactions and\npending ordered extents:\n\n 1. Transaction A is in TRANS_STATE_COMMIT_DOING state\n\n 2. A worker processing an ordered extent calls start_transaction()\n with TRANS_JOIN\n\n 3. join_transaction() returns -EBUSY because Transaction A is in\n TRANS_STATE_COMMIT_DOING\n\n 4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes\n\n 5. A new Transaction B is created (TRANS_STATE_RUNNING)\n\n 6. The ordered extent from step 2 is added to Transaction B\u0027s\n pending ordered extents\n\n 7. Transaction B immediately starts commit by another task and\n enters TRANS_STATE_COMMIT_START\n\n 8. The worker finally reaches wait_current_trans(), sees Transaction B\n in TRANS_STATE_COMMIT_START (a blocked state), and waits\n unconditionally\n\n 9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START\n according to btrfs_blocked_trans_types[]\n\n 10. Transaction B is waiting for pending ordered extents to complete\n\n 11. Deadlock: Transaction B waits for ordered extent, ordered extent\n waits for Transaction B\n\nThis can be illustrated by the following call stacks:\n CPU0 CPU1\n btrfs_finish_ordered_io()\n start_transaction(TRANS_JOIN)\n join_transaction()\n # -EBUSY (Transaction A is\n # TRANS_STATE_COMMIT_DOING)\n # Transaction A completes\n # Transaction B created\n # ordered extent added to\n # Transaction B\u0027s pending list\n btrfs_commit_transaction()\n # Transaction B enters\n # TRANS_STATE_COMMIT_START\n # waiting for pending ordered\n # extents\n wait_current_trans()\n # waits for Transaction B\n # (should not wait!)\n\nTask bstore_kv_sync in btrfs_commit_transaction waiting for ordered\nextents:\n\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n btrfs_commit_transaction+0xbf7/0xda0 [btrfs]\n btrfs_sync_file+0x342/0x4d0 [btrfs]\n __x64_sys_fdatasync+0x4b/0x80\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nTask kworker in wait_current_trans waiting for transaction commit:\n\n Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n wait_current_trans+0xb0/0x110 [btrfs]\n start_transaction+0x346/0x5b0 [btrfs]\n btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]\n btrfs_work_helper+0xe8/0x350 [btrfs]\n process_one_work+0x1d3/0x3c0\n worker_thread+0x4d/0x3e0\n kthread+0x12d/0x150\n ret_from_fork+0x1f/0x30\n\nFix this by passing the transaction type to wait_current_trans() and\nchecking btrfs_blocked_trans_types[cur_trans-\u003estate] against the given\ntype before deciding to wait. This ensures that transaction types which\nare allowed to join during certain blocked states will not unnecessarily\nwait and cause deadlocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71194",
"url": "https://www.suse.com/security/cve/CVE-2025-71194"
},
{
"category": "external",
"summary": "SUSE Bug 1257687 for CVE-2025-71194",
"url": "https://bugzilla.suse.com/1257687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71194"
},
{
"cve": "CVE-2025-71195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71195"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: xilinx: xdma: Fix regmap max_register\n\nThe max_register field is assigned the size of the register memory\nregion instead of the offset of the last register.\nThe result is that reading from the regmap via debugfs can cause\na segmentation fault:\n\ntail /sys/kernel/debug/regmap/xdma.1.auto/registers\nUnable to handle kernel paging request at virtual address ffff800082f70000\nMem abort info:\n ESR = 0x0000000096000007\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x07: level 3 translation fault\n[...]\nCall trace:\n regmap_mmio_read32le+0x10/0x30\n _regmap_bus_reg_read+0x74/0xc0\n _regmap_read+0x68/0x198\n regmap_read+0x54/0x88\n regmap_read_debugfs+0x140/0x380\n regmap_map_read_file+0x30/0x48\n full_proxy_read+0x68/0xc8\n vfs_read+0xcc/0x310\n ksys_read+0x7c/0x120\n __arm64_sys_read+0x24/0x40\n invoke_syscall.constprop.0+0x64/0x108\n do_el0_svc+0xb0/0xd8\n el0_svc+0x38/0x130\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\nCode: aa1e03e9 d503201f f9400000 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---\nnote: tail[1217] exited with irqs disabled\nnote: tail[1217] exited with preempt_count 1\nSegmentation fault",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71195",
"url": "https://www.suse.com/security/cve/CVE-2025-71195"
},
{
"category": "external",
"summary": "SUSE Bug 1257704 for CVE-2025-71195",
"url": "https://bugzilla.suse.com/1257704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71195"
},
{
"cve": "CVE-2025-71196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: stm32-usphyc: Fix off by one in probe()\n\nThe \"index\" variable is used as an index into the usbphyc-\u003ephys[] array\nwhich has usbphyc-\u003enphys elements. So if it is equal to usbphyc-\u003enphys\nthen it is one element out of bounds. The \"index\" comes from the\ndevice tree so it\u0027s data that we trust and it\u0027s unlikely to be wrong,\nhowever it\u0027s obviously still worth fixing the bug. Change the \u003e to \u003e=.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71196",
"url": "https://www.suse.com/security/cve/CVE-2025-71196"
},
{
"category": "external",
"summary": "SUSE Bug 1257716 for CVE-2025-71196",
"url": "https://bugzilla.suse.com/1257716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71196"
},
{
"cve": "CVE-2025-71197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nw1: therm: Fix off-by-one buffer overflow in alarms_store\n\nThe sysfs buffer passed to alarms_store() is allocated with \u0027size + 1\u0027\nbytes and a NUL terminator is appended. However, the \u0027size\u0027 argument\ndoes not account for this extra byte. The original code then allocated\n\u0027size\u0027 bytes and used strcpy() to copy \u0027buf\u0027, which always writes one\nbyte past the allocated buffer since strcpy() copies until the NUL\nterminator at index \u0027size\u0027.\n\nFix this by parsing the \u0027buf\u0027 parameter directly using simple_strtoll()\nwithout allocating any intermediate memory or string copying. This\nremoves the overflow while simplifying the code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71197",
"url": "https://www.suse.com/security/cve/CVE-2025-71197"
},
{
"category": "external",
"summary": "SUSE Bug 1257743 for CVE-2025-71197",
"url": "https://bugzilla.suse.com/1257743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71197"
},
{
"cve": "CVE-2025-71198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection\n\nThe st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL\nevent_spec field, indicating support for IIO events. However, event\ndetection is not supported for all sensors, and if userspace tries to\nconfigure accelerometer wakeup events on a sensor device that does not\nsupport them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL\npointer when trying to write to the wakeup register.\nDefine an additional struct iio_chan_spec array whose members have a NULL\nevent_spec field, and use this array instead of st_lsm6dsx_acc_channels for\nsensors without event detection capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71198",
"url": "https://www.suse.com/security/cve/CVE-2025-71198"
},
{
"category": "external",
"summary": "SUSE Bug 1257741 for CVE-2025-71198",
"url": "https://bugzilla.suse.com/1257741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71198"
},
{
"cve": "CVE-2025-71199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71199"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver\n\nat91_adc_interrupt can call at91_adc_touch_data_handler function\nto start the work by schedule_work(\u0026st-\u003etouch_st.workq).\n\nIf we remove the module which will call at91_adc_remove to\nmake cleanup, it will free indio_dev through iio_device_unregister but\nquite a bit later. While the work mentioned above will be used. The\nsequence of operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | at91_adc_workq_handler\nat91_adc_remove |\niio_device_unregister(indio_dev) |\n//free indio_dev a bit later |\n | iio_push_to_buffers(indio_dev)\n | //use indio_dev\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in at91_adc_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71199",
"url": "https://www.suse.com/security/cve/CVE-2025-71199"
},
{
"category": "external",
"summary": "SUSE Bug 1257750 for CVE-2025-71199",
"url": "https://bugzilla.suse.com/1257750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71199"
},
{
"cve": "CVE-2025-71200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode\n\nWhen operating in HS200 or HS400 timing modes, reducing the clock frequency\nbelow 52MHz will lead to link broken as the Rockchip DWC MSHC controller\nrequires maintaining a minimum clock of 52MHz in these modes.\n\nAdd a check to prevent illegal clock reduction through debugfs:\n\nroot@debian:/# echo 50000000 \u003e /sys/kernel/debug/mmc0/clock\nroot@debian:/# [ 30.090146] mmc0: running CQE recovery\nmmc0: cqhci: Failed to halt\nmmc0: cqhci: spurious TCN for tag 0\nWARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24\nModules linked in:\nCPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT\nHardware name: Rockchip RK3588 EVB1 V10 Board (DT)\nWorkqueue: kblockd blk_mq_run_work_fn\npstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : cqhci_irq+0x254/0x818\nlr : cqhci_irq+0x254/0x818\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71200",
"url": "https://www.suse.com/security/cve/CVE-2025-71200"
},
{
"category": "external",
"summary": "SUSE Bug 1258222 for CVE-2025-71200",
"url": "https://bugzilla.suse.com/1258222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wlcore: ensure skb headroom before skb_push\n\nThis avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is\nless than needed (typically 110 - 94 = 16 bytes).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71222",
"url": "https://www.suse.com/security/cve/CVE-2025-71222"
},
{
"category": "external",
"summary": "SUSE Bug 1258279 for CVE-2025-71222",
"url": "https://bugzilla.suse.com/1258279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: ocb: skip rx_no_sta when interface is not joined\n\nieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only\npresent after JOIN_OCB.\n\nRX may run before JOIN_OCB is executed, in which case the OCB interface\nis not operational. Skip RX peer handling when the interface is not\njoined to avoid warnings in the RX path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71224",
"url": "https://www.suse.com/security/cve/CVE-2025-71224"
},
{
"category": "external",
"summary": "SUSE Bug 1258824 for CVE-2025-71224",
"url": "https://bugzilla.suse.com/1258824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2025-71225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: suspend array while updating raid_disks via sysfs\n\nIn raid1_reshape(), freeze_array() is called before modifying the r1bio\nmemory pool (conf-\u003er1bio_pool) and conf-\u003eraid_disks, and\nunfreeze_array() is called after the update is completed.\n\nHowever, freeze_array() only waits until nr_sync_pending and\n(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error\noccurs, nr_queued is increased and the corresponding r1bio is queued to\neither retry_list or bio_end_io_list. As a result, freeze_array() may\nunblock before these r1bios are released.\n\nThis can lead to a situation where conf-\u003eraid_disks and the mempool have\nalready been updated while queued r1bios, allocated with the old\nraid_disks value, are later released. Consequently, free_r1bio() may\naccess memory out of bounds in put_all_bios() and release r1bios of the\nwrong size to the new mempool, potentially causing issues with the\nmempool as well.\n\nSince only normal I/O might increase nr_queued while an I/O error occurs,\nsuspending the array avoids this issue.\n\nNote: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends\nthe array. Therefore, we suspend the array when updating raid_disks\nvia sysfs to avoid this issue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71225",
"url": "https://www.suse.com/security/cve/CVE-2025-71225"
},
{
"category": "external",
"summary": "SUSE Bug 1258411 for CVE-2025-71225",
"url": "https://bugzilla.suse.com/1258411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71225"
},
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Avoid creating sub-groups asynchronously\n\nThe asynchronous creation of sub-groups by a delayed work could lead to a\nNULL pointer dereference when the driver directory is removed before the\nwork completes.\n\nThe crash can be easily reproduced with the following commands:\n\n # cd /sys/kernel/config/pci_ep/functions/pci_epf_test\n # for i in {1..20}; do mkdir test \u0026\u0026 rmdir test; done\n\n BUG: kernel NULL pointer dereference, address: 0000000000000088\n ...\n Call Trace:\n configfs_register_group+0x3d/0x190\n pci_epf_cfs_work+0x41/0x110\n process_one_work+0x18f/0x350\n worker_thread+0x25a/0x3a0\n\nFix this issue by using configfs_add_default_group() API which does not\nhave the deadlock problem as configfs_register_group() and does not require\nthe delayed work handler.\n\n[mani: slightly reworded the description and added stable list]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71233",
"url": "https://www.suse.com/security/cve/CVE-2025-71233"
},
{
"category": "external",
"summary": "SUSE Bug 1258421 for CVE-2025-71233",
"url": "https://bugzilla.suse.com/1258421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71233"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2026-22979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix memory leak in skb_segment_list for GRO packets\n\nWhen skb_segment_list() is called during packet forwarding, it handles\npackets that were aggregated by the GRO engine.\n\nHistorically, the segmentation logic in skb_segment_list assumes that\nindividual segments are split from a parent SKB and may need to carry\ntheir own socket memory accounting. Accordingly, the code transfers\ntruesize from the parent to the newly created segments.\n\nPrior to commit ed4cccef64c1 (\"gro: fix ownership transfer\"), this\ntruesize subtraction in skb_segment_list() was valid because fragments\nstill carry a reference to the original socket.\n\nHowever, commit ed4cccef64c1 (\"gro: fix ownership transfer\") changed\nthis behavior by ensuring that fraglist entries are explicitly\norphaned (skb-\u003esk = NULL) to prevent illegal orphaning later in the\nstack. This change meant that the entire socket memory charge remained\nwith the head SKB, but the corresponding accounting logic in\nskb_segment_list() was never updated.\n\nAs a result, the current code unconditionally adds each fragment\u0027s\ntruesize to delta_truesize and subtracts it from the parent SKB. Since\nthe fragments are no longer charged to the socket, this subtraction\nresults in an effective under-count of memory when the head is freed.\nThis causes sk_wmem_alloc to remain non-zero, preventing socket\ndestruction and leading to a persistent memory leak.\n\nThe leak can be observed via KMEMLEAK when tearing down the networking\nenvironment:\n\nunreferenced object 0xffff8881e6eb9100 (size 2048):\n comm \"ping\", pid 6720, jiffies 4295492526\n backtrace:\n kmem_cache_alloc_noprof+0x5c6/0x800\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x35/0xa00\n inet6_create.part.0+0x303/0x10d0\n __sock_create+0x248/0x640\n __sys_socket+0x11b/0x1d0\n\nSince skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST\npackets constructed by GRO, the truesize adjustment is removed.\n\nThe call to skb_release_head_state() must be preserved. As documented in\ncommit cf673ed0e057 (\"net: fix fraglist segmentation reference count\nleak\"), it is still required to correctly drop references to SKB\nextensions that may be overwritten during __copy_skb_header().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22979",
"url": "https://www.suse.com/security/cve/CVE-2026-22979"
},
{
"category": "external",
"summary": "SUSE Bug 1257228 for CVE-2026-22979",
"url": "https://bugzilla.suse.com/1257228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-22979"
},
{
"cve": "CVE-2026-22980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: provide locking for v4_end_grace\n\nWriting to v4_end_grace can race with server shutdown and result in\nmemory being accessed after it was freed - reclaim_str_hashtbl in\nparticularly.\n\nWe cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is\nheld while client_tracking_op-\u003einit() is called and that can wait for\nan upcall to nfsdcltrack which can write to v4_end_grace, resulting in a\ndeadlock.\n\nnfsd4_end_grace() is also called by the landromat work queue and this\ndoesn\u0027t require locking as server shutdown will stop the work and wait\nfor it before freeing anything that nfsd4_end_grace() might access.\n\nHowever, we must be sure that writing to v4_end_grace doesn\u0027t restart\nthe work item after shutdown has already waited for it. For this we\nadd a new flag protected with nn-\u003eclient_lock. It is set only while it\nis safe to make client tracking calls, and v4_end_grace only schedules\nwork while the flag is set with the spinlock held.\n\nSo this patch adds a nfsd_net field \"client_tracking_active\" which is\nset as described. Another field \"grace_end_forced\", is set when\nv4_end_grace is written. After this is set, and providing\nclient_tracking_active is set, the laundromat is scheduled.\nThis \"grace_end_forced\" field bypasses other checks for whether the\ngrace period has finished.\n\nThis resolves a race which can result in use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22980",
"url": "https://www.suse.com/security/cve/CVE-2026-22980"
},
{
"category": "external",
"summary": "SUSE Bug 1257222 for CVE-2026-22980",
"url": "https://bugzilla.suse.com/1257222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-22980"
},
{
"cve": "CVE-2026-22998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec\n\nCommit efa56305908b (\"nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\")\nadded ttag bounds checking and data_offset\nvalidation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate\nwhether the command\u0027s data structures (cmd-\u003ereq.sg and cmd-\u003eiov) have\nbeen properly initialized before processing H2C_DATA PDUs.\n\nThe nvmet_tcp_build_pdu_iovec() function dereferences these pointers\nwithout NULL checks. This can be triggered by sending H2C_DATA PDU\nimmediately after the ICREQ/ICRESP handshake, before\nsending a CONNECT command or NVMe write command.\n\nAttack vectors that trigger NULL pointer dereferences:\n1. H2C_DATA PDU sent before CONNECT -\u003e both pointers NULL\n2. H2C_DATA PDU for READ command -\u003e cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n3. H2C_DATA PDU for uninitialized command slot -\u003e both pointers NULL\n\nThe fix validates both cmd-\u003ereq.sg and cmd-\u003eiov before calling\nnvmet_tcp_build_pdu_iovec(). Both checks are required because:\n- Uninitialized commands: both NULL\n- READ commands: cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n- WRITE commands: both allocated",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22998",
"url": "https://www.suse.com/security/cve/CVE-2026-22998"
},
{
"category": "external",
"summary": "SUSE Bug 1257209 for CVE-2026-22998",
"url": "https://bugzilla.suse.com/1257209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-22998"
},
{
"cve": "CVE-2026-23003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()\n\nBlamed commit did not take care of VLAN encapsulations\nas spotted by syzbot [1].\n\nUse skb_vlan_inet_prepare() instead of pskb_inet_may_pull().\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729\n __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860\n ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903\n gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1\n ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500\n ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590\n dst_input include/net/dst.h:474 [inline]\n ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core net/core/dev.c:6139 [inline]\n __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252\n netif_receive_skb_internal net/core/dev.c:6338 [inline]\n netif_receive_skb+0x57/0x630 net/core/dev.c:6397\n tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4960 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586\n __alloc_skb+0x805/0x1040 net/core/skbuff.c:690\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712\n sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995\n tun_alloc_skb drivers/net/tun.c:1461 [inline]\n tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23003",
"url": "https://www.suse.com/security/cve/CVE-2026-23003"
},
{
"category": "external",
"summary": "SUSE Bug 1257246 for CVE-2026-23003",
"url": "https://bugzilla.suse.com/1257246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23003"
},
{
"cve": "CVE-2026-23004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()\n\nsyzbot was able to crash the kernel in rt6_uncached_list_flush_dev()\nin an interesting way [1]\n\nCrash happens in list_del_init()/INIT_LIST_HEAD() while writing\nlist-\u003eprev, while the prior write on list-\u003enext went well.\n\nstatic inline void INIT_LIST_HEAD(struct list_head *list)\n{\n\tWRITE_ONCE(list-\u003enext, list); // This went well\n\tWRITE_ONCE(list-\u003eprev, list); // Crash, @list has been freed.\n}\n\nIssue here is that rt6_uncached_list_del() did not attempt to lock\nul-\u003elock, as list_empty(\u0026rt-\u003edst.rt_uncached) returned\ntrue because the WRITE_ONCE(list-\u003enext, list) happened on the other CPU.\n\nWe might use list_del_init_careful() and list_empty_careful(),\nor make sure rt6_uncached_list_del() always grabs the spinlock\nwhenever rt-\u003edst.rt_uncached_list has been set.\n\nA similar fix is neeed for IPv4.\n\n[1]\n\n BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]\n BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]\n BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\nWrite of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450\n\nCPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)}\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: netns cleanup_net\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n INIT_LIST_HEAD include/linux/list.h:46 [inline]\n list_del_init include/linux/list.h:296 [inline]\n rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\n addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853\n addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1\n notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85\n call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]\n call_netdevice_notifiers net/core/dev.c:2282 [inline]\n netif_close_many+0x29c/0x410 net/core/dev.c:1785\n unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353\n ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]\n ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248\n cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n \u003c/TASK\u003e\n\nAllocated by task 803:\n kasan_save_stack mm/kasan/common.c:57 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:78\n unpoison_slab_object mm/kasan/common.c:340 [inline]\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366\n kasan_slab_alloc include/linux/kasan.h:253 [inline]\n slab_post_alloc_hook mm/slub.c:4953 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270\n dst_alloc+0x105/0x170 net/core/dst.c:89\n ip6_dst_alloc net/ipv6/route.c:342 [inline]\n icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333\n mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23004",
"url": "https://www.suse.com/security/cve/CVE-2026-23004"
},
{
"category": "external",
"summary": "SUSE Bug 1257231 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "external",
"summary": "SUSE Bug 1258655 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1258655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23004"
},
{
"cve": "CVE-2026-23010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23010"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix use-after-free in inet6_addr_del().\n\nsyzbot reported use-after-free of inet6_ifaddr in\ninet6_addr_del(). [0]\n\nThe cited commit accidentally moved ipv6_del_addr() for\nmngtmpaddr before reading its ifp-\u003eflags for temporary\naddresses in inet6_addr_del().\n\nLet\u0027s move ipv6_del_addr() down to fix the UAF.\n\n[0]:\nBUG: KASAN: slab-use-after-free in inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117\nRead of size 4 at addr ffff88807b89c86c by task syz.3.1618/9593\n\nCPU: 0 UID: 0 PID: 9593 Comm: syz.3.1618 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcd/0x630 mm/kasan/report.c:482\n kasan_report+0xe0/0x110 mm/kasan/report.c:595\n inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117\n addrconf_del_ifaddr+0x11e/0x190 net/ipv6/addrconf.c:3181\n inet6_ioctl+0x1e5/0x2b0 net/ipv6/af_inet6.c:582\n sock_do_ioctl+0x118/0x280 net/socket.c:1254\n sock_ioctl+0x227/0x6b0 net/socket.c:1375\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f164cf8f749\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f164de64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f164d1e5fa0 RCX: 00007f164cf8f749\nRDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003\nRBP: 00007f164d013f91 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f164d1e6038 R14: 00007f164d1e5fa0 R15: 00007ffde15c8288\n \u003c/TASK\u003e\n\nAllocated by task 9593:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:56\n kasan_save_track+0x14/0x30 mm/kasan/common.c:77\n poison_kmalloc_redzone mm/kasan/common.c:397 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:414\n kmalloc_noprof include/linux/slab.h:957 [inline]\n kzalloc_noprof include/linux/slab.h:1094 [inline]\n ipv6_add_addr+0x4e3/0x2010 net/ipv6/addrconf.c:1120\n inet6_addr_add+0x256/0x9b0 net/ipv6/addrconf.c:3050\n addrconf_add_ifaddr+0x1fc/0x450 net/ipv6/addrconf.c:3160\n inet6_ioctl+0x103/0x2b0 net/ipv6/af_inet6.c:580\n sock_do_ioctl+0x118/0x280 net/socket.c:1254\n sock_ioctl+0x227/0x6b0 net/socket.c:1375\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6099:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:56\n kasan_save_track+0x14/0x30 mm/kasan/common.c:77\n kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584\n poison_slab_object mm/kasan/common.c:252 [inline]\n __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284\n kasan_slab_free include/linux/kasan.h:234 [inline]\n slab_free_hook mm/slub.c:2540 [inline]\n slab_free_freelist_hook mm/slub.c:2569 [inline]\n slab_free_bulk mm/slub.c:6696 [inline]\n kmem_cache_free_bulk mm/slub.c:7383 [inline]\n kmem_cache_free_bulk+0x2bf/0x680 mm/slub.c:7362\n kfree_bulk include/linux/slab.h:830 [inline]\n kvfree_rcu_bulk+0x1b7/0x1e0 mm/slab_common.c:1523\n kvfree_rcu_drain_ready mm/slab_common.c:1728 [inline]\n kfree_rcu_monitor+0x1d0/0x2f0 mm/slab_common.c:1801\n process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257\n process_scheduled_works kernel/workqu\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23010",
"url": "https://www.suse.com/security/cve/CVE-2026-23010"
},
{
"category": "external",
"summary": "SUSE Bug 1257332 for CVE-2026-23010",
"url": "https://bugzilla.suse.com/1257332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23010"
},
{
"cve": "CVE-2026-23017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix error handling in the init_task on load\n\nIf the init_task fails during a driver load, we end up without vports and\nnetdevs, effectively failing the entire process. In that state a\nsubsequent reset will result in a crash as the service task attempts to\naccess uninitialized resources. Following trace is from an error in the\ninit_task where the CREATE_VPORT (op 501) is rejected by the FW:\n\n[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated\n[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)\n[40958.148190] idpf 0000:83:00.0: HW reset detected\n[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8\n...\n[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]\n[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]\n...\n[40958.177932] Call Trace:\n[40958.178491] \u003cTASK\u003e\n[40958.179040] process_one_work+0x226/0x6d0\n[40958.179609] worker_thread+0x19e/0x340\n[40958.180158] ? __pfx_worker_thread+0x10/0x10\n[40958.180702] kthread+0x10f/0x250\n[40958.181238] ? __pfx_kthread+0x10/0x10\n[40958.181774] ret_from_fork+0x251/0x2b0\n[40958.182307] ? __pfx_kthread+0x10/0x10\n[40958.182834] ret_from_fork_asm+0x1a/0x30\n[40958.183370] \u003c/TASK\u003e\n\nFix the error handling in the init_task to make sure the service and\nmailbox tasks are disabled if the error happens during load. These are\nstarted in idpf_vc_core_init(), which spawns the init_task and has no way\nof knowing if it failed. If the error happens on reset, following\nsuccessful driver load, the tasks can still run, as that will allow the\nnetdevs to attempt recovery through another reset. Stop the PTP callbacks\neither way as those will be restarted by the call to idpf_vc_core_init()\nduring a successful reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23017",
"url": "https://www.suse.com/security/cve/CVE-2026-23017"
},
{
"category": "external",
"summary": "SUSE Bug 1257552 for CVE-2026-23017",
"url": "https://bugzilla.suse.com/1257552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23017"
},
{
"cve": "CVE-2026-23018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23018"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: release path before initializing extent tree in btrfs_read_locked_inode()\n\nIn btrfs_read_locked_inode() we are calling btrfs_init_file_extent_tree()\nwhile holding a path with a read locked leaf from a subvolume tree, and\nbtrfs_init_file_extent_tree() may do a GFP_KERNEL allocation, which can\ntrigger reclaim.\n\nThis can create a circular lock dependency which lockdep warns about with\nthe following splat:\n\n [6.1433] ======================================================\n [6.1574] WARNING: possible circular locking dependency detected\n [6.1583] 6.18.0+ #4 Tainted: G U\n [6.1591] ------------------------------------------------------\n [6.1599] kswapd0/117 is trying to acquire lock:\n [6.1606] ffff8d9b6333c5b8 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node.part.0+0x39/0x2f0\n [6.1625]\n but task is already holding lock:\n [6.1633] ffffffffa4ab8ce0 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat+0x195/0xc60\n [6.1646]\n which lock already depends on the new lock.\n\n [6.1657]\n the existing dependency chain (in reverse order) is:\n [6.1667]\n -\u003e #2 (fs_reclaim){+.+.}-{0:0}:\n [6.1677] fs_reclaim_acquire+0x9d/0xd0\n [6.1685] __kmalloc_cache_noprof+0x59/0x750\n [6.1694] btrfs_init_file_extent_tree+0x90/0x100\n [6.1702] btrfs_read_locked_inode+0xc3/0x6b0\n [6.1710] btrfs_iget+0xbb/0xf0\n [6.1716] btrfs_lookup_dentry+0x3c5/0x8e0\n [6.1724] btrfs_lookup+0x12/0x30\n [6.1731] lookup_open.isra.0+0x1aa/0x6a0\n [6.1739] path_openat+0x5f7/0xc60\n [6.1746] do_filp_open+0xd6/0x180\n [6.1753] do_sys_openat2+0x8b/0xe0\n [6.1760] __x64_sys_openat+0x54/0xa0\n [6.1768] do_syscall_64+0x97/0x3e0\n [6.1776] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [6.1784]\n -\u003e #1 (btrfs-tree-00){++++}-{3:3}:\n [6.1794] lock_release+0x127/0x2a0\n [6.1801] up_read+0x1b/0x30\n [6.1808] btrfs_search_slot+0x8e0/0xff0\n [6.1817] btrfs_lookup_inode+0x52/0xd0\n [6.1825] __btrfs_update_delayed_inode+0x73/0x520\n [6.1833] btrfs_commit_inode_delayed_inode+0x11a/0x120\n [6.1842] btrfs_log_inode+0x608/0x1aa0\n [6.1849] btrfs_log_inode_parent+0x249/0xf80\n [6.1857] btrfs_log_dentry_safe+0x3e/0x60\n [6.1865] btrfs_sync_file+0x431/0x690\n [6.1872] do_fsync+0x39/0x80\n [6.1879] __x64_sys_fsync+0x13/0x20\n [6.1887] do_syscall_64+0x97/0x3e0\n [6.1894] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [6.1903]\n -\u003e #0 (\u0026delayed_node-\u003emutex){+.+.}-{3:3}:\n [6.1913] __lock_acquire+0x15e9/0x2820\n [6.1920] lock_acquire+0xc9/0x2d0\n [6.1927] __mutex_lock+0xcc/0x10a0\n [6.1934] __btrfs_release_delayed_node.part.0+0x39/0x2f0\n [6.1944] btrfs_evict_inode+0x20b/0x4b0\n [6.1952] evict+0x15a/0x2f0\n [6.1958] prune_icache_sb+0x91/0xd0\n [6.1966] super_cache_scan+0x150/0x1d0\n [6.1974] do_shrink_slab+0x155/0x6f0\n [6.1981] shrink_slab+0x48e/0x890\n [6.1988] shrink_one+0x11a/0x1f0\n [6.1995] shrink_node+0xbfd/0x1320\n [6.1002] balance_pgdat+0x67f/0xc60\n [6.1321] kswapd+0x1dc/0x3e0\n [6.1643] kthread+0xff/0x240\n [6.1965] ret_from_fork+0x223/0x280\n [6.1287] ret_from_fork_asm+0x1a/0x30\n [6.1616]\n other info that might help us debug this:\n\n [6.1561] Chain exists of:\n \u0026delayed_node-\u003emutex --\u003e btrfs-tree-00 --\u003e fs_reclaim\n\n [6.1503] Possible unsafe locking scenario:\n\n [6.1110] CPU0 CPU1\n [6.1411] ---- ----\n [6.1707] lock(fs_reclaim);\n [6.1998] lock(btrfs-tree-00);\n [6.1291] lock(fs_reclaim);\n [6.1581] lock(\u0026del\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23018",
"url": "https://www.suse.com/security/cve/CVE-2026-23018"
},
{
"category": "external",
"summary": "SUSE Bug 1257551 for CVE-2026-23018",
"url": "https://bugzilla.suse.com/1257551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23018"
},
{
"cve": "CVE-2026-23021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: pegasus: fix memory leak in update_eth_regs_async()\n\nWhen asynchronously writing to the device registers and if usb_submit_urb()\nfail, the code fail to release allocated to this point resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23021",
"url": "https://www.suse.com/security/cve/CVE-2026-23021"
},
{
"category": "external",
"summary": "SUSE Bug 1257557 for CVE-2026-23021",
"url": "https://bugzilla.suse.com/1257557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23021"
},
{
"cve": "CVE-2026-23022",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23022"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix memory leak in idpf_vc_core_deinit()\n\nMake sure to free hw-\u003elan_regs. Reported by kmemleak during reset:\n\nunreferenced object 0xff1b913d02a936c0 (size 96):\n comm \"kworker/u258:14\", pid 2174, jiffies 4294958305\n hex dump (first 32 bytes):\n 00 00 00 c0 a8 ba 2d ff 00 00 00 00 00 00 00 00 ......-.........\n 00 00 40 08 00 00 00 00 00 00 25 b3 a8 ba 2d ff ..@.......%...-.\n backtrace (crc 36063c4f):\n __kmalloc_noprof+0x48f/0x890\n idpf_vc_core_init+0x6ce/0x9b0 [idpf]\n idpf_vc_event_task+0x1fb/0x350 [idpf]\n process_one_work+0x226/0x6d0\n worker_thread+0x19e/0x340\n kthread+0x10f/0x250\n ret_from_fork+0x251/0x2b0\n ret_from_fork_asm+0x1a/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23022",
"url": "https://www.suse.com/security/cve/CVE-2026-23022"
},
{
"category": "external",
"summary": "SUSE Bug 1257581 for CVE-2026-23022",
"url": "https://bugzilla.suse.com/1257581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23022"
},
{
"cve": "CVE-2026-23023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23023"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix memory leak in idpf_vport_rel()\n\nFree vport-\u003erx_ptype_lkup in idpf_vport_rel() to avoid leaking memory\nduring a reset. Reported by kmemleak:\n\nunreferenced object 0xff450acac838a000 (size 4096):\n comm \"kworker/u258:5\", pid 7732, jiffies 4296830044\n hex dump (first 32 bytes):\n 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 ................\n backtrace (crc 3da81902):\n __kmalloc_cache_noprof+0x469/0x7a0\n idpf_send_get_rx_ptype_msg+0x90/0x570 [idpf]\n idpf_init_task+0x1ec/0x8d0 [idpf]\n process_one_work+0x226/0x6d0\n worker_thread+0x19e/0x340\n kthread+0x10f/0x250\n ret_from_fork+0x251/0x2b0\n ret_from_fork_asm+0x1a/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23023",
"url": "https://www.suse.com/security/cve/CVE-2026-23023"
},
{
"category": "external",
"summary": "SUSE Bug 1257556 for CVE-2026-23023",
"url": "https://bugzilla.suse.com/1257556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23023"
},
{
"cve": "CVE-2026-23024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix memory leak of flow steer list on rmmod\n\nThe flow steering list maintains entries that are added and removed as\nethtool creates and deletes flow steering rules. Module removal with active\nentries causes memory leak as the list is not properly cleaned up.\n\nPrevent this by iterating through the remaining entries in the list and\nfreeing the associated memory during module removal. Add a spinlock\n(flow_steer_list_lock) to protect the list access from multiple threads.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23024",
"url": "https://www.suse.com/security/cve/CVE-2026-23024"
},
{
"category": "external",
"summary": "SUSE Bug 1257572 for CVE-2026-23024",
"url": "https://bugzilla.suse.com/1257572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23024"
},
{
"cve": "CVE-2026-23026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()\n\nFix a memory leak in gpi_peripheral_config() where the original memory\npointed to by gchan-\u003econfig could be lost if krealloc() fails.\n\nThe issue occurs when:\n1. gchan-\u003econfig points to previously allocated memory\n2. krealloc() fails and returns NULL\n3. The function directly assigns NULL to gchan-\u003econfig, losing the\n reference to the original memory\n4. The original memory becomes unreachable and cannot be freed\n\nFix this by using a temporary variable to hold the krealloc() result\nand only updating gchan-\u003econfig when the allocation succeeds.\n\nFound via static analysis and code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23026",
"url": "https://www.suse.com/security/cve/CVE-2026-23026"
},
{
"category": "external",
"summary": "SUSE Bug 1257562 for CVE-2026-23026",
"url": "https://bugzilla.suse.com/1257562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23026"
},
{
"cve": "CVE-2026-23030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()\n\nThe for_each_available_child_of_node() calls of_node_put() to\nrelease child_np in each success loop. After breaking from the\nloop with the child_np has been released, the code will jump to\nthe put_child label and will call the of_node_put() again if the\ndevm_request_threaded_irq() fails. These cause a double free bug.\n\nFix by returning directly to avoid the duplicate of_node_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23030",
"url": "https://www.suse.com/security/cve/CVE-2026-23030"
},
{
"category": "external",
"summary": "SUSE Bug 1257561 for CVE-2026-23030",
"url": "https://bugzilla.suse.com/1257561"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23030"
},
{
"cve": "CVE-2026-23031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak\n\nIn gs_can_open(), the URBs for USB-in transfers are allocated, added to the\nparent-\u003erx_submitted anchor and submitted. In the complete callback\ngs_usb_receive_bulk_callback(), the URB is processed and resubmitted. In\ngs_can_close() the URBs are freed by calling\nusb_kill_anchored_urbs(parent-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in gs_can_close().\n\nFix the memory leak by anchoring the URB in the\ngs_usb_receive_bulk_callback() to the parent-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23031",
"url": "https://www.suse.com/security/cve/CVE-2026-23031"
},
{
"category": "external",
"summary": "SUSE Bug 1257600 for CVE-2026-23031",
"url": "https://bugzilla.suse.com/1257600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23031"
},
{
"cve": "CVE-2026-23033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: omap-dma: fix dma_pool resource leak in error paths\n\nThe dma_pool created by dma_pool_create() is not destroyed when\ndma_async_device_register() or of_dma_controller_register() fails,\ncausing a resource leak in the probe error paths.\n\nAdd dma_pool_destroy() in both error paths to properly release the\nallocated dma_pool resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23033",
"url": "https://www.suse.com/security/cve/CVE-2026-23033"
},
{
"category": "external",
"summary": "SUSE Bug 1257570 for CVE-2026-23033",
"url": "https://bugzilla.suse.com/1257570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23033"
},
{
"cve": "CVE-2026-23035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails.\n\nPass netdev to mlx5e_destroy_netdev() to guarantee it will work on a\nvalid netdev.\n\nOn mlx5e_remove: Check validity of priv-\u003eprofile, before attempting\nto cleanup any resources that might be not there.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000370\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100\nRSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286\nRAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0\nRBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10\nR10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0\nR13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400\nFS: 00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_remove+0x57/0x110\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23035",
"url": "https://www.suse.com/security/cve/CVE-2026-23035"
},
{
"category": "external",
"summary": "SUSE Bug 1257559 for CVE-2026-23035",
"url": "https://bugzilla.suse.com/1257559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23035"
},
{
"cve": "CVE-2026-23037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: allow partial RX URB allocation to succeed\n\nWhen es58x_alloc_rx_urbs() fails to allocate the requested number of\nURBs but succeeds in allocating some, it returns an error code.\nThis causes es58x_open() to return early, skipping the cleanup label\n\u0027free_urbs\u0027, which leads to the anchored URBs being leaked.\n\nAs pointed out by maintainer Vincent Mailhol, the driver is designed\nto handle partial URB allocation gracefully. Therefore, partial\nallocation should not be treated as a fatal error.\n\nModify es58x_alloc_rx_urbs() to return 0 if at least one URB has been\nallocated, restoring the intended behavior and preventing the leak\nin es58x_open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23037",
"url": "https://www.suse.com/security/cve/CVE-2026-23037"
},
{
"category": "external",
"summary": "SUSE Bug 1257554 for CVE-2026-23037",
"url": "https://bugzilla.suse.com/1257554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23037"
},
{
"cve": "CVE-2026-23038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()\n\nIn nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails,\nthe function jumps to the out_scratch label without freeing the already\nallocated dsaddrs list, leading to a memory leak.\n\nFix this by jumping to the out_err_drain_dsaddrs label, which properly\nfrees the dsaddrs list before cleaning up other resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23038",
"url": "https://www.suse.com/security/cve/CVE-2026-23038"
},
{
"category": "external",
"summary": "SUSE Bug 1257553 for CVE-2026-23038",
"url": "https://bugzilla.suse.com/1257553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23038"
},
{
"cve": "CVE-2026-23042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23042"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix aux device unplugging when rdma is not supported by vport\n\nIf vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not\nallocate vdev_info for this vport. This leads to kernel NULL pointer\ndereference in idpf_idc_vport_dev_down(), which references vdev_info for\nevery vport regardless.\n\nCheck, if vdev_info was ever allocated before unplugging aux device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23042",
"url": "https://www.suse.com/security/cve/CVE-2026-23042"
},
{
"category": "external",
"summary": "SUSE Bug 1257705 for CVE-2026-23042",
"url": "https://bugzilla.suse.com/1257705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23042"
},
{
"cve": "CVE-2026-23047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make calc_target() set t-\u003epaused, not just clear it\n\nCurrently calc_target() clears t-\u003epaused if the request shouldn\u0027t be\npaused anymore, but doesn\u0027t ever set t-\u003epaused even though it\u0027s able to\ndetermine when the request should be paused. Setting t-\u003epaused is left\nto __submit_request() which is fine for regular requests but doesn\u0027t\nwork for linger requests -- since __submit_request() doesn\u0027t operate\non linger requests, there is nowhere for lreq-\u003et.paused to be set.\nOne consequence of this is that watches don\u0027t get reestablished on\npaused -\u003e unpaused transitions in cases where requests have been paused\nlong enough for the (paused) unwatch request to time out and for the\nsubsequent (re)watch request to enter the paused state. On top of the\nwatch not getting reestablished, rbd_reregister_watch() gets stuck with\nrbd_dev-\u003ewatch_mutex held:\n\n rbd_register_watch\n __rbd_register_watch\n ceph_osdc_watch\n linger_reg_commit_wait\n\nIt\u0027s waiting for lreq-\u003ereg_commit_wait to be completed, but for that to\nhappen the respective request needs to end up on need_resend_linger list\nand be kicked when requests are unpaused. There is no chance for that\nif the request in question is never marked paused in the first place.\n\nThe fact that rbd_dev-\u003ewatch_mutex remains taken out forever then\nprevents the image from getting unmapped -- \"rbd unmap\" would inevitably\nhang in D state on an attempt to grab the mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23047",
"url": "https://www.suse.com/security/cve/CVE-2026-23047"
},
{
"category": "external",
"summary": "SUSE Bug 1257682 for CVE-2026-23047",
"url": "https://bugzilla.suse.com/1257682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23047"
},
{
"cve": "CVE-2026-23049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel\n\nThe connector type for the DataImage SCF0700C48GGU18 panel is missing and\ndevm_drm_panel_bridge_add() requires connector type to be set. This leads\nto a warning and a backtrace in the kernel log and panel does not work:\n\"\nWARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8\n\"\nThe warning is triggered by a check for valid connector type in\ndevm_drm_panel_bridge_add(). If there is no valid connector type\nset for a panel, the warning is printed and panel is not added.\nFill in the missing connector type to fix the warning and make\nthe panel operational once again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23049",
"url": "https://www.suse.com/security/cve/CVE-2026-23049"
},
{
"category": "external",
"summary": "SUSE Bug 1257723 for CVE-2026-23049",
"url": "https://bugzilla.suse.com/1257723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23049"
},
{
"cve": "CVE-2026-23050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23050"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npNFS: Fix a deadlock when returning a delegation during open()\n\nBen Coddington reports seeing a hang in the following stack trace:\n 0 [ffffd0b50e1774e0] __schedule at ffffffff9ca05415\n 1 [ffffd0b50e177548] schedule at ffffffff9ca05717\n 2 [ffffd0b50e177558] bit_wait at ffffffff9ca061e1\n 3 [ffffd0b50e177568] __wait_on_bit at ffffffff9ca05cfb\n 4 [ffffd0b50e1775c8] out_of_line_wait_on_bit at ffffffff9ca05ea5\n 5 [ffffd0b50e177618] pnfs_roc at ffffffffc154207b [nfsv4]\n 6 [ffffd0b50e1776b8] _nfs4_proc_delegreturn at ffffffffc1506586 [nfsv4]\n 7 [ffffd0b50e177788] nfs4_proc_delegreturn at ffffffffc1507480 [nfsv4]\n 8 [ffffd0b50e1777f8] nfs_do_return_delegation at ffffffffc1523e41 [nfsv4]\n 9 [ffffd0b50e177838] nfs_inode_set_delegation at ffffffffc1524a75 [nfsv4]\n 10 [ffffd0b50e177888] nfs4_process_delegation at ffffffffc14f41dd [nfsv4]\n 11 [ffffd0b50e1778a0] _nfs4_opendata_to_nfs4_state at ffffffffc1503edf [nfsv4]\n 12 [ffffd0b50e1778c0] _nfs4_open_and_get_state at ffffffffc1504e56 [nfsv4]\n 13 [ffffd0b50e177978] _nfs4_do_open at ffffffffc15051b8 [nfsv4]\n 14 [ffffd0b50e1779f8] nfs4_do_open at ffffffffc150559c [nfsv4]\n 15 [ffffd0b50e177a80] nfs4_atomic_open at ffffffffc15057fb [nfsv4]\n 16 [ffffd0b50e177ad0] nfs4_file_open at ffffffffc15219be [nfsv4]\n 17 [ffffd0b50e177b78] do_dentry_open at ffffffff9c09e6ea\n 18 [ffffd0b50e177ba8] vfs_open at ffffffff9c0a082e\n 19 [ffffd0b50e177bd0] dentry_open at ffffffff9c0a0935\n\nThe issue is that the delegreturn is being asked to wait for a layout\nreturn that cannot complete because a state recovery was initiated. The\nstate recovery cannot complete until the open() finishes processing the\ndelegations it was given.\n\nThe solution is to propagate the existing flags that indicate a\nnon-blocking call to the function pnfs_roc(), so that it knows not to\nwait in this situation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23050",
"url": "https://www.suse.com/security/cve/CVE-2026-23050"
},
{
"category": "external",
"summary": "SUSE Bug 1257688 for CVE-2026-23050",
"url": "https://bugzilla.suse.com/1257688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23050"
},
{
"cve": "CVE-2026-23053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a deadlock involving nfs_release_folio()\n\nWang Zhaolong reports a deadlock involving NFSv4.1 state recovery\nwaiting on kthreadd, which is attempting to reclaim memory by calling\nnfs_release_folio(). The latter cannot make progress due to state\nrecovery being needed.\n\nIt seems that the only safe thing to do here is to kick off a writeback\nof the folio, without waiting for completion, or else kicking off an\nasynchronous commit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23053",
"url": "https://www.suse.com/security/cve/CVE-2026-23053"
},
{
"category": "external",
"summary": "SUSE Bug 1257718 for CVE-2026-23053",
"url": "https://bugzilla.suse.com/1257718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23053"
},
{
"cve": "CVE-2026-23054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hv_netvsc: reject RSS hash key programming without RX indirection table\n\nRSS configuration requires a valid RX indirection table. When the device\nreports a single receive queue, rndis_filter_device_add() does not\nallocate an indirection table, accepting RSS hash key updates in this\nstate leads to a hang.\n\nFix this by gating netvsc_set_rxfh() on ndc-\u003erx_table_sz and return\n-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device\ncapabilities and prevents incorrect behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23054",
"url": "https://www.suse.com/security/cve/CVE-2026-23054"
},
{
"category": "external",
"summary": "SUSE Bug 1257732 for CVE-2026-23054",
"url": "https://bugzilla.suse.com/1257732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: riic: Move suspend handling to NOIRQ phase\n\nCommit 53326135d0e0 (\"i2c: riic: Add suspend/resume support\") added\nsuspend support for the Renesas I2C driver and following this change\non RZ/G3E the following WARNING is seen on entering suspend ...\n\n[ 134.275704] Freezing remaining freezable tasks completed (elapsed 0.001 seconds)\n[ 134.285536] ------------[ cut here ]------------\n[ 134.290298] i2c i2c-2: Transfer while suspended\n[ 134.295174] WARNING: drivers/i2c/i2c-core.h:56 at __i2c_smbus_xfer+0x1e4/0x214, CPU#0: systemd-sleep/388\n[ 134.365507] Tainted: [W]=WARN\n[ 134.368485] Hardware name: Renesas SMARC EVK version 2 based on r9a09g047e57 (DT)\n[ 134.375961] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 134.382935] pc : __i2c_smbus_xfer+0x1e4/0x214\n[ 134.387329] lr : __i2c_smbus_xfer+0x1e4/0x214\n[ 134.391717] sp : ffff800083f23860\n[ 134.395040] x29: ffff800083f23860 x28: 0000000000000000 x27: ffff800082ed5d60\n[ 134.402226] x26: 0000001f4395fd74 x25: 0000000000000007 x24: 0000000000000001\n[ 134.409408] x23: 0000000000000000 x22: 000000000000006f x21: ffff800083f23936\n[ 134.416589] x20: ffff0000c090e140 x19: ffff0000c090e0d0 x18: 0000000000000006\n[ 134.423771] x17: 6f63657320313030 x16: 2e30206465737061 x15: ffff800083f23280\n[ 134.430953] x14: 0000000000000000 x13: ffff800082b16ce8 x12: 0000000000000f09\n[ 134.438134] x11: 0000000000000503 x10: ffff800082b6ece8 x9 : ffff800082b16ce8\n[ 134.445315] x8 : 00000000ffffefff x7 : ffff800082b6ece8 x6 : 80000000fffff000\n[ 134.452495] x5 : 0000000000000504 x4 : 0000000000000000 x3 : 0000000000000000\n[ 134.459672] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c9ee9e80\n[ 134.466851] Call trace:\n[ 134.469311] __i2c_smbus_xfer+0x1e4/0x214 (P)\n[ 134.473715] i2c_smbus_xfer+0xbc/0x120\n[ 134.477507] i2c_smbus_read_byte_data+0x4c/0x84\n[ 134.482077] isl1208_i2c_read_time+0x44/0x178 [rtc_isl1208]\n[ 134.487703] isl1208_rtc_read_time+0x14/0x20 [rtc_isl1208]\n[ 134.493226] __rtc_read_time+0x44/0x88\n[ 134.497012] rtc_read_time+0x3c/0x68\n[ 134.500622] rtc_suspend+0x9c/0x170\n\nThe warning is triggered because I2C transfers can still be attempted\nwhile the controller is already suspended, due to inappropriate ordering\nof the system sleep callbacks.\n\nIf the controller is autosuspended, there is no way to wake it up once\nruntime PM disabled (in suspend_late()). During system resume, the I2C\ncontroller will be available only after runtime PM is re-enabled\n(in resume_early()). However, this may be too late for some devices.\n\nWake up the controller in the suspend() callback while runtime PM is\nstill enabled. The I2C controller will remain available until the\nsuspend_noirq() callback (pm_runtime_force_suspend()) is called. During\nresume, the I2C controller can be restored by the resume_noirq() callback\n(pm_runtime_force_resume()). Finally, the resume() callback re-enables\nautosuspend. As a result, the I2C controller can remain available until\nthe system enters suspend_noirq() and from resume_noirq().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23055",
"url": "https://www.suse.com/security/cve/CVE-2026-23055"
},
{
"category": "external",
"summary": "SUSE Bug 1257730 for CVE-2026-23055",
"url": "https://bugzilla.suse.com/1257730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23055"
},
{
"cve": "CVE-2026-23056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: implement mremap in uacce_vm_ops to return -EPERM\n\nThe current uacce_vm_ops does not support the mremap operation of\nvm_operations_struct. Implement .mremap to return -EPERM to remind\nusers.\n\nThe reason we need to explicitly disable mremap is that when the\ndriver does not implement .mremap, it uses the default mremap\nmethod. This could lead to a risk scenario:\n\nAn application might first mmap address p1, then mremap to p2,\nfollowed by munmap(p1), and finally munmap(p2). Since the default\nmremap copies the original vma\u0027s vm_private_data (i.e., q) to the\nnew vma, both munmap operations would trigger vma_close, causing\nq-\u003eqfr to be freed twice(qfr will be set to null here, so repeated\nrelease is ok).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23056",
"url": "https://www.suse.com/security/cve/CVE-2026-23056"
},
{
"category": "external",
"summary": "SUSE Bug 1257729 for CVE-2026-23056",
"url": "https://bugzilla.suse.com/1257729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23056"
},
{
"cve": "CVE-2026-23057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Coalesce only linear skb\n\nvsock/virtio common tries to coalesce buffers in rx queue: if a linear skb\n(with a spare tail room) is followed by a small skb (length limited by\nGOOD_COPY_LEN = 128), an attempt is made to join them.\n\nSince the introduction of MSG_ZEROCOPY support, assumption that a small skb\nwill always be linear is incorrect. In the zerocopy case, data is lost and\nthe linear skb is appended with uninitialized kernel memory.\n\nOf all 3 supported virtio-based transports, only loopback-transport is\naffected. G2H virtio-transport rx queue operates on explicitly linear skbs;\nsee virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G\nvhost-transport may allocate non-linear skbs, but only for sizes that are\nnot considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in\nvirtio_vsock_alloc_skb().\n\nEnsure only linear skbs are coalesced. Note that skb_tailroom(last_skb) \u003e 0\nguarantees last_skb is linear.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23057",
"url": "https://www.suse.com/security/cve/CVE-2026-23057"
},
{
"category": "external",
"summary": "SUSE Bug 1257740 for CVE-2026-23057",
"url": "https://bugzilla.suse.com/1257740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23057"
},
{
"cve": "CVE-2026-23058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn ems_usb_open(), the URBs for USB-in transfers are allocated, added to\nthe dev-\u003erx_submitted anchor and submitted. In the complete callback\nems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nems_usb_close() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in ems_usb_close().\n\nFix the memory leak by anchoring the URB in the\nems_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23058",
"url": "https://www.suse.com/security/cve/CVE-2026-23058"
},
{
"category": "external",
"summary": "SUSE Bug 1257739 for CVE-2026-23058",
"url": "https://bugzilla.suse.com/1257739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23058"
},
{
"cve": "CVE-2026-23059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Sanitize payload size to prevent member overflow\n\nIn qla27xx_copy_fpin_pkt() and qla27xx_copy_multiple_pkt(), the frame_size\nreported by firmware is used to calculate the copy length into\nitem-\u003eiocb. However, the iocb member is defined as a fixed-size 64-byte\narray within struct purex_item.\n\nIf the reported frame_size exceeds 64 bytes, subsequent memcpy calls will\noverflow the iocb member boundary. While extra memory might be allocated,\nthis cross-member write is unsafe and triggers warnings under\nCONFIG_FORTIFY_SOURCE.\n\nFix this by capping total_bytes to the size of the iocb member (64 bytes)\nbefore allocation and copying. This ensures all copies remain within the\nbounds of the destination structure member.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23059",
"url": "https://www.suse.com/security/cve/CVE-2026-23059"
},
{
"category": "external",
"summary": "SUSE Bug 1257737 for CVE-2026-23059",
"url": "https://bugzilla.suse.com/1257737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23059"
},
{
"cve": "CVE-2026-23060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec\n\nauthencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than\nthe minimum expected length, crypto_authenc_esn_decrypt() can advance past\nthe end of the destination scatterlist and trigger a NULL pointer dereference\nin scatterwalk_map_and_copy(), leading to a kernel panic (DoS).\n\nAdd a minimum AAD length check to fail fast on invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23060",
"url": "https://www.suse.com/security/cve/CVE-2026-23060"
},
{
"category": "external",
"summary": "SUSE Bug 1257735 for CVE-2026-23060",
"url": "https://bugzilla.suse.com/1257735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn kvaser_usb_set_{,data_}bittiming() -\u003e kvaser_usb_setup_rx_urbs(), the\nURBs for USB-in transfers are allocated, added to the dev-\u003erx_submitted\nanchor and submitted. In the complete callback\nkvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nkvaser_usb_remove_interfaces() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nkvaser_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23061",
"url": "https://www.suse.com/security/cve/CVE-2026-23061"
},
{
"category": "external",
"summary": "SUSE Bug 1257776 for CVE-2026-23061",
"url": "https://bugzilla.suse.com/1257776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23061"
},
{
"cve": "CVE-2026-23062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro\n\nThe GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs\nattributes:\n\n1. Off-by-one error: The loop condition used \u0027\u003c=\u0027 instead of \u0027\u003c\u0027,\n causing access beyond array bounds. Since array indices are 0-based\n and go from 0 to instances_count-1, the loop should use \u0027\u003c\u0027.\n\n2. Missing NULL check: The code dereferenced attr_name_kobj-\u003ename\n without checking if attr_name_kobj was NULL, causing a null pointer\n dereference in min_length_show() and other attribute show functions.\n\nThe panic occurred when fwupd tried to read BIOS configuration attributes:\n\n Oops: general protection fault [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:min_length_show+0xcf/0x1d0 [hp_bioscfg]\n\nAdd a NULL check for attr_name_kobj before dereferencing and corrects\nthe loop boundary to match the pattern used elsewhere in the driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23062",
"url": "https://www.suse.com/security/cve/CVE-2026-23062"
},
{
"category": "external",
"summary": "SUSE Bug 1257734 for CVE-2026-23062",
"url": "https://bugzilla.suse.com/1257734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23062"
},
{
"cve": "CVE-2026-23063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: ensure safe queue release with state management\n\nDirectly calling `put_queue` carries risks since it cannot\nguarantee that resources of `uacce_queue` have been fully released\nbeforehand. So adding a `stop_queue` operation for the\nUACCE_CMD_PUT_Q command and leaving the `put_queue` operation to\nthe final resource release ensures safety.\n\nQueue states are defined as follows:\n- UACCE_Q_ZOMBIE: Initial state\n- UACCE_Q_INIT: After opening `uacce`\n- UACCE_Q_STARTED: After `start` is issued via `ioctl`\n\nWhen executing `poweroff -f` in virt while accelerator are still\nworking, `uacce_fops_release` and `uacce_remove` may execute\nconcurrently. This can cause `uacce_put_queue` within\n`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add\nstate checks to prevent accessing freed pointers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23063",
"url": "https://www.suse.com/security/cve/CVE-2026-23063"
},
{
"category": "external",
"summary": "SUSE Bug 1257722 for CVE-2026-23063",
"url": "https://bugzilla.suse.com/1257722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23063"
},
{
"cve": "CVE-2026-23064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ife: avoid possible NULL deref\n\ntcf_ife_encode() must make sure ife_encode() does not return NULL.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166\nCPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)\nCall Trace:\n \u003cTASK\u003e\n ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101\n tcf_ife_encode net/sched/act_ife.c:841 [inline]\n tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877\n tc_act include/net/tc_wrapper.h:130 [inline]\n tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152\n tcf_exts_exec include/net/pkt_cls.h:349 [inline]\n mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42\n tc_classify include/net/tc_wrapper.h:197 [inline]\n __tcf_classify net/sched/cls_api.c:1764 [inline]\n tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860\n multiq_classify net/sched/sch_multiq.c:39 [inline]\n multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66\n dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147\n __dev_xmit_skb net/core/dev.c:4262 [inline]\n __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23064",
"url": "https://www.suse.com/security/cve/CVE-2026-23064"
},
{
"category": "external",
"summary": "SUSE Bug 1257765 for CVE-2026-23064",
"url": "https://bugzilla.suse.com/1257765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23064"
},
{
"cve": "CVE-2026-23065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23065"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd: Fix memory leak in wbrf_record()\n\nThe tmp buffer is allocated using kcalloc() but is not freed if\nacpi_evaluate_dsm() fails. This causes a memory leak in the error path.\n\nFix this by explicitly freeing the tmp buffer in the error handling\npath of acpi_evaluate_dsm().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23065",
"url": "https://www.suse.com/security/cve/CVE-2026-23065"
},
{
"category": "external",
"summary": "SUSE Bug 1257742 for CVE-2026-23065",
"url": "https://bugzilla.suse.com/1257742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23065"
},
{
"cve": "CVE-2026-23066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix recvmsg() unconditional requeue\n\nIf rxrpc_recvmsg() fails because MSG_DONTWAIT was specified but the call at\nthe front of the recvmsg queue already has its mutex locked, it requeues\nthe call - whether or not the call is already queued. The call may be on\nthe queue because MSG_PEEK was also passed and so the call was not dequeued\nor because the I/O thread requeued it.\n\nThe unconditional requeue may then corrupt the recvmsg queue, leading to\nthings like UAFs or refcount underruns.\n\nFix this by only requeuing the call if it isn\u0027t already on the queue - and\nmoving it to the front if it is already queued. If we don\u0027t queue it, we\nhave to put the ref we obtained by dequeuing it.\n\nAlso, MSG_PEEK doesn\u0027t dequeue the call so shouldn\u0027t call\nrxrpc_notify_socket() for the call if we didn\u0027t use up all the data on the\nqueue, so fix that also.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23066",
"url": "https://www.suse.com/security/cve/CVE-2026-23066"
},
{
"category": "external",
"summary": "SUSE Bug 1257726 for CVE-2026-23066",
"url": "https://bugzilla.suse.com/1257726"
},
{
"category": "external",
"summary": "SUSE Bug 1257728 for CVE-2026-23066",
"url": "https://bugzilla.suse.com/1257728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23066"
},
{
"cve": "CVE-2026-23068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-sprd-adi: Fix double free in probe error path\n\nThe driver currently uses spi_alloc_host() to allocate the controller\nbut registers it using devm_spi_register_controller().\n\nIf devm_register_restart_handler() fails, the code jumps to the\nput_ctlr label and calls spi_controller_put(). However, since the\ncontroller was registered via a devm function, the device core will\nautomatically call spi_controller_put() again when the probe fails.\nThis results in a double-free of the spi_controller structure.\n\nFix this by switching to devm_spi_alloc_host() and removing the\nmanual spi_controller_put() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23068",
"url": "https://www.suse.com/security/cve/CVE-2026-23068"
},
{
"category": "external",
"summary": "SUSE Bug 1257805 for CVE-2026-23068",
"url": "https://bugzilla.suse.com/1257805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23068"
},
{
"cve": "CVE-2026-23069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: fix potential underflow in virtio_transport_get_credit()\n\nThe credit calculation in virtio_transport_get_credit() uses unsigned\narithmetic:\n\n ret = vvs-\u003epeer_buf_alloc - (vvs-\u003etx_cnt - vvs-\u003epeer_fwd_cnt);\n\nIf the peer shrinks its advertised buffer (peer_buf_alloc) while bytes\nare in flight, the subtraction can underflow and produce a large\npositive value, potentially allowing more data to be queued than the\npeer can handle.\n\nReuse virtio_transport_has_space() which already handles this case and\nadd a comment to make it clear why we are doing that.\n\n[Stefano: use virtio_transport_has_space() instead of duplicating the code]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23069",
"url": "https://www.suse.com/security/cve/CVE-2026-23069"
},
{
"category": "external",
"summary": "SUSE Bug 1257755 for CVE-2026-23069",
"url": "https://bugzilla.suse.com/1257755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23069"
},
{
"cve": "CVE-2026-23070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nOcteontx2-af: Add proper checks for fwdata\n\nfirmware populates MAC address, link modes (supported, advertised)\nand EEPROM data in shared firmware structure which kernel access\nvia MAC block(CGX/RPM).\n\nAccessing fwdata, on boards booted with out MAC block leading to\nkernel panics.\n\nInternal error: Oops: 0000000096000005 [#1] SMP\n[ 10.460721] Modules linked in:\n[ 10.463779] CPU: 0 UID: 0 PID: 174 Comm: kworker/0:3 Not tainted 6.19.0-rc5-00154-g76ec646abdf7-dirty #3 PREEMPT\n[ 10.474045] Hardware name: Marvell OcteonTX CN98XX board (DT)\n[ 10.479793] Workqueue: events work_for_cpu_fn\n[ 10.484159] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 10.491124] pc : rvu_sdp_init+0x18/0x114\n[ 10.495051] lr : rvu_probe+0xe58/0x1d18",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23070",
"url": "https://www.suse.com/security/cve/CVE-2026-23070"
},
{
"category": "external",
"summary": "SUSE Bug 1257709 for CVE-2026-23070",
"url": "https://bugzilla.suse.com/1257709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23070"
},
{
"cve": "CVE-2026-23071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix race condition in hwspinlock irqsave routine\n\nPreviously, the address of the shared member \u0027\u0026map-\u003espinlock_flags\u0027 was\npassed directly to \u0027hwspin_lock_timeout_irqsave\u0027. This creates a race\ncondition where multiple contexts contending for the lock could overwrite\nthe shared flags variable, potentially corrupting the state for the\ncurrent lock owner.\n\nFix this by using a local stack variable \u0027flags\u0027 to store the IRQ state\ntemporarily.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23071",
"url": "https://www.suse.com/security/cve/CVE-2026-23071"
},
{
"category": "external",
"summary": "SUSE Bug 1257706 for CVE-2026-23071",
"url": "https://bugzilla.suse.com/1257706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23071"
},
{
"cve": "CVE-2026-23073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rsi: Fix memory corruption due to not set vif driver data size\n\nThe struct ieee80211_vif contains trailing space for vif driver data,\nwhen struct ieee80211_vif is allocated, the total memory size that is\nallocated is sizeof(struct ieee80211_vif) + size of vif driver data.\nThe size of vif driver data is set by each WiFi driver as needed.\n\nThe RSI911x driver does not set vif driver data size, no trailing space\nfor vif driver data is therefore allocated past struct ieee80211_vif .\nThe RSI911x driver does however use the vif driver data to store its\nvif driver data structure \"struct vif_priv\". An access to vif-\u003edrv_priv\nleads to access out of struct ieee80211_vif bounds and corruption of\nsome memory.\n\nIn case of the failure observed locally, rsi_mac80211_add_interface()\nwould write struct vif_priv *vif_info = (struct vif_priv *)vif-\u003edrv_priv;\nvif_info-\u003evap_id = vap_idx. This write corrupts struct fq_tin member\nstruct list_head new_flows . The flow = list_first_entry(head, struct\nfq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus\naddress, which when accessed causes a crash.\n\nThe trigger is very simple, boot the machine with init=/bin/sh , mount\ndevtmpfs, sysfs, procfs, and then do \"ip link set wlan0 up\", \"sleep 1\",\n\"ip link set wlan0 down\" and the crash occurs.\n\nFix this by setting the correct size of vif driver data, which is the\nsize of \"struct vif_priv\", so that memory is allocated and the driver\ncan store its driver data in it, instead of corrupting memory around\nit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23073",
"url": "https://www.suse.com/security/cve/CVE-2026-23073"
},
{
"category": "external",
"summary": "SUSE Bug 1257707 for CVE-2026-23073",
"url": "https://bugzilla.suse.com/1257707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23073"
},
{
"cve": "CVE-2026-23074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim \u003ckm.kim1503@gmail.com\u003e managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n \u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql\u0027s enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch-\u003eq.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql\u0027s\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2\u0027s lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc\u0027s\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem\u0027s delay), a dangling pointer is\naccessed causing GangMin\u0027s causing a UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23074",
"url": "https://www.suse.com/security/cve/CVE-2026-23074"
},
{
"category": "external",
"summary": "SUSE Bug 1257749 for CVE-2026-23074",
"url": "https://bugzilla.suse.com/1257749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ctxfi: Fix potential OOB access in audio mixer handling\n\nIn the audio mixer handling code of ctxfi driver, the conf field is\nused as a kind of loop index, and it\u0027s referred in the index callbacks\n(amixer_index() and sum_index()).\n\nAs spotted recently by fuzzers, the current code causes OOB access at\nthose functions.\n| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48\n| index 8 is out of range for type \u0027unsigned char [8]\u0027\n\nAfter the analysis, the cause was found to be the lack of the proper\n(re-)initialization of conj field.\n\nThis patch addresses those OOB accesses by adding the proper\ninitializations of the loop indices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23076",
"url": "https://www.suse.com/security/cve/CVE-2026-23076"
},
{
"category": "external",
"summary": "SUSE Bug 1257788 for CVE-2026-23076",
"url": "https://bugzilla.suse.com/1257788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23076"
},
{
"cve": "CVE-2026-23078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Fix buffer overflow in config retrieval\n\nThe scarlett2_usb_get_config() function has a logic error in the\nendianness conversion code that can cause buffer overflows when\ncount \u003e 1.\n\nThe code checks `if (size == 2)` where `size` is the total buffer size in\nbytes, then loops `count` times treating each element as u16 (2 bytes).\nThis causes the loop to access `count * 2` bytes when the buffer only\nhas `size` bytes allocated.\n\nFix by checking the element size (config_item-\u003esize) instead of the\ntotal buffer size. This ensures the endianness conversion matches the\nactual element type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23078",
"url": "https://www.suse.com/security/cve/CVE-2026-23078"
},
{
"category": "external",
"summary": "SUSE Bug 1257789 for CVE-2026-23078",
"url": "https://bugzilla.suse.com/1257789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23078"
},
{
"cve": "CVE-2026-23080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn mcba_usb_probe() -\u003e mcba_usb_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback mcba_usb_read_bulk_callback(), the URBs are processed and\nresubmitted. In mcba_usb_close() -\u003e mcba_urb_unlink() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nmcba_usb_read_bulk_callback()to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23080",
"url": "https://www.suse.com/security/cve/CVE-2026-23080"
},
{
"category": "external",
"summary": "SUSE Bug 1257714 for CVE-2026-23080",
"url": "https://bugzilla.suse.com/1257714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23080"
},
{
"cve": "CVE-2026-23082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error\n\nIn commit 7352e1d5932a (\"can: gs_usb: gs_usb_receive_bulk_callback(): fix\nURB memory leak\"), the URB was re-anchored before usb_submit_urb() in\ngs_usb_receive_bulk_callback() to prevent a leak of this URB during\ncleanup.\n\nHowever, this patch did not take into account that usb_submit_urb() could\nfail. The URB remains anchored and\nusb_kill_anchored_urbs(\u0026parent-\u003erx_submitted) in gs_can_close() loops\ninfinitely since the anchor list never becomes empty.\n\nTo fix the bug, unanchor the URB when an usb_submit_urb() error occurs,\nalso print an info message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23082",
"url": "https://www.suse.com/security/cve/CVE-2026-23082"
},
{
"category": "external",
"summary": "SUSE Bug 1257715 for CVE-2026-23082",
"url": "https://bugzilla.suse.com/1257715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23082"
},
{
"cve": "CVE-2026-23083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO.\n\nfou_udp_recv() has the same problem mentioned in the previous\npatch.\n\nIf FOU_ATTR_IPPROTO is set to 0, skb is not freed by\nfou_udp_recv() nor \"resubmit\"-ted in ip_protocol_deliver_rcu().\n\nLet\u0027s forbid 0 for FOU_ATTR_IPPROTO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23083",
"url": "https://www.suse.com/security/cve/CVE-2026-23083"
},
{
"category": "external",
"summary": "SUSE Bug 1257745 for CVE-2026-23083",
"url": "https://bugzilla.suse.com/1257745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "low"
}
],
"title": "CVE-2026-23083"
},
{
"cve": "CVE-2026-23084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list\n\nWhen the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is\nset to false, the driver may request the PMAC_ID from the firmware of the\nnetwork card, and this function will store that PMAC_ID at the provided\naddress pmac_id. This is the contract of this function.\n\nHowever, there is a location within the driver where both\npmac_id_valid == false and pmac_id == NULL are being passed. This could\nresult in dereferencing a NULL pointer.\n\nTo resolve this issue, it is necessary to pass the address of a stub\nvariable to the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23084",
"url": "https://www.suse.com/security/cve/CVE-2026-23084"
},
{
"category": "external",
"summary": "SUSE Bug 1257830 for CVE-2026-23084",
"url": "https://bugzilla.suse.com/1257830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23084"
},
{
"cve": "CVE-2026-23085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Avoid truncating memory addresses\n\nOn 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem\nallocations to be backed by addresses physical memory above the 32-bit\naddress limit, as found while experimenting with larger VMSPLIT\nconfigurations.\n\nThis caused the qemu virt model to crash in the GICv3 driver, which\nallocates the \u0027itt\u0027 object using GFP_KERNEL. Since all memory below\nthe 4GB physical address limit is in ZONE_DMA in this configuration,\nkmalloc() defaults to higher addresses for ZONE_NORMAL, and the\nITS driver stores the physical address in a 32-bit \u0027unsigned long\u0027\nvariable.\n\nChange the itt_addr variable to the correct phys_addr_t type instead,\nalong with all other variables in this driver that hold a physical\naddress.\n\nThe gicv5 driver correctly uses u64 variables, while all other irqchip\ndrivers don\u0027t call virt_to_phys or similar interfaces. It\u0027s expected that\nother device drivers have similar issues, but fixing this one is\nsufficient for booting a virtio based guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23085",
"url": "https://www.suse.com/security/cve/CVE-2026-23085"
},
{
"category": "external",
"summary": "SUSE Bug 1257758 for CVE-2026-23085",
"url": "https://bugzilla.suse.com/1257758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23085"
},
{
"cve": "CVE-2026-23086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: cap TX credit to local buffer size\n\nThe virtio transports derives its TX credit directly from peer_buf_alloc,\nwhich is set from the remote endpoint\u0027s SO_VM_SOCKETS_BUFFER_SIZE value.\n\nOn the host side this means that the amount of data we are willing to\nqueue for a connection is scaled by a guest-chosen buffer size, rather\nthan the host\u0027s own vsock configuration. A malicious guest can advertise\na large buffer and read slowly, causing the host to allocate a\ncorrespondingly large amount of sk_buff memory.\nThe same thing would happen in the guest with a malicious host, since\nvirtio transports share the same code base.\n\nIntroduce a small helper, virtio_transport_tx_buf_size(), that\nreturns min(peer_buf_alloc, buf_alloc), and use it wherever we consume\npeer_buf_alloc.\n\nThis ensures the effective TX window is bounded by both the peer\u0027s\nadvertised buffer and our own buf_alloc (already clamped to\nbuffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer\ncannot force the other to queue more data than allowed by its own\nvsock settings.\n\nOn an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with\n32 guest vsock connections advertising 2 GiB each and reading slowly\ndrove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only\nrecovered after killing the QEMU process. That said, if QEMU memory is\nlimited with cgroups, the maximum memory used will be limited.\n\nWith this patch applied:\n\n Before:\n MemFree: ~61.6 GiB\n Slab: ~142 MiB\n SUnreclaim: ~117 MiB\n\n After 32 high-credit connections:\n MemFree: ~61.5 GiB\n Slab: ~178 MiB\n SUnreclaim: ~152 MiB\n\nOnly ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest\nremains responsive.\n\nCompatibility with non-virtio transports:\n\n - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per\n socket based on the local vsk-\u003ebuffer_* values; the remote side\n cannot enlarge those queues beyond what the local endpoint\n configured.\n\n - Hyper-V\u0027s vsock transport uses fixed-size VMBus ring buffers and\n an MTU bound; there is no peer-controlled credit field comparable\n to peer_buf_alloc, and the remote endpoint cannot drive in-flight\n kernel memory above those ring sizes.\n\n - The loopback path reuses virtio_transport_common.c, so it\n naturally follows the same semantics as the virtio transport.\n\nThis change is limited to virtio_transport_common.c and thus affects\nvirtio-vsock, vhost-vsock, and loopback, bringing them in line with the\n\"remote window intersected with local policy\" behaviour that VMCI and\nHyper-V already effectively have.\n\n[Stefano: small adjustments after changing the previous patch]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23086",
"url": "https://www.suse.com/security/cve/CVE-2026-23086"
},
{
"category": "external",
"summary": "SUSE Bug 1257757 for CVE-2026-23086",
"url": "https://bugzilla.suse.com/1257757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23086"
},
{
"cve": "CVE-2026-23088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix crash on synthetic stacktrace field usage\n\nWhen creating a synthetic event based on an existing synthetic event that\nhad a stacktrace field and the new synthetic event used that field a\nkernel crash occurred:\n\n ~# cd /sys/kernel/tracing\n ~# echo \u0027s:stack unsigned long stack[];\u0027 \u003e dynamic_events\n ~# echo \u0027hist:keys=prev_pid:s0=common_stacktrace if prev_state \u0026 3\u0027 \u003e\u003e events/sched/sched_switch/trigger\n ~# echo \u0027hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)\u0027 \u003e\u003e events/sched/sched_switch/trigger\n\nThe above creates a synthetic event that takes a stacktrace when a task\nschedules out in a non-running state and passes that stacktrace to the\nsched_switch event when that task schedules back in. It triggers the\n\"stack\" synthetic event that has a stacktrace as its field (called \"stack\").\n\n ~# echo \u0027s:syscall_stack s64 id; unsigned long stack[];\u0027 \u003e\u003e dynamic_events\n ~# echo \u0027hist:keys=common_pid:s2=stack\u0027 \u003e\u003e events/synthetic/stack/trigger\n ~# echo \u0027hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)\u0027 \u003e\u003e events/raw_syscalls/sys_exit/trigger\n\nThe above makes another synthetic event called \"syscall_stack\" that\nattaches the first synthetic event (stack) to the sys_exit trace event and\nrecords the stacktrace from the stack event with the id of the system call\nthat is exiting.\n\nWhen enabling this event (or using it in a historgram):\n\n ~# echo 1 \u003e events/synthetic/syscall_stack/enable\n\nProduces a kernel crash!\n\n BUG: unable to handle page fault for address: 0000000000400010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP PTI\n CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy) Debian 6.16.3-1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:trace_event_raw_event_synth+0x90/0x380\n Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 \u003c49\u003e 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f\n RSP: 0018:ffffd2670388f958 EFLAGS: 00010202\n RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0\n RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50\n R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010\n R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90\n FS: 00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ? __tracing_map_insert+0x208/0x3a0\n action_trace+0x67/0x70\n event_hist_trigger+0x633/0x6d0\n event_triggers_call+0x82/0x130\n trace_event_buffer_commit+0x19d/0x250\n trace_event_raw_event_sys_exit+0x62/0xb0\n syscall_exit_work+0x9d/0x140\n do_syscall_64+0x20a/0x2f0\n ? trace_event_raw_event_sched_switch+0x12b/0x170\n ? save_fpregs_to_fpstate+0x3e/0x90\n ? _raw_spin_unlock+0xe/0x30\n ? finish_task_switch.isra.0+0x97/0x2c0\n ? __rseq_handle_notify_resume+0xad/0x4c0\n ? __schedule+0x4b8/0xd00\n ? restore_fpregs_from_fpstate+0x3c/0x90\n ? switch_fpu_return+0x5b/0xe0\n ? do_syscall_64+0x1ef/0x2f0\n ? do_fault+0x2e9/0x540\n ? __handle_mm_fault+0x7d1/0xf70\n ? count_memcg_events+0x167/0x1d0\n ? handle_mm_fault+0x1d7/0x2e0\n ? do_user_addr_fault+0x2c3/0x7f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reason is that the stacktrace field is not labeled as such, and is\ntreated as a normal field and not as a dynamic event that it is.\n\nIn trace_event_raw_event_synth() the event is field is still treated as a\ndynamic array, but the retrieval of the data is considered a normal field,\nand the reference is just the meta data:\n\n// Meta data is retrieved instead of a dynamic array\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23088",
"url": "https://www.suse.com/security/cve/CVE-2026-23088"
},
{
"category": "external",
"summary": "SUSE Bug 1257814 for CVE-2026-23088",
"url": "https://bugzilla.suse.com/1257814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23088"
},
{
"cve": "CVE-2026-23089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer-\u003eid_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n ...\n snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23089",
"url": "https://www.suse.com/security/cve/CVE-2026-23089"
},
{
"category": "external",
"summary": "SUSE Bug 1257790 for CVE-2026-23089",
"url": "https://bugzilla.suse.com/1257790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: core: fix device reference leak on report present\n\nSlimbus devices can be allocated dynamically upon reception of\nreport-present messages.\n\nMake sure to drop the reference taken when looking up already registered\ndevices.\n\nNote that this requires taking an extra reference in case the device has\nnot yet been registered and has to be allocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23090",
"url": "https://www.suse.com/security/cve/CVE-2026-23090"
},
{
"category": "external",
"summary": "SUSE Bug 1257759 for CVE-2026-23090",
"url": "https://bugzilla.suse.com/1257759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23090"
},
{
"cve": "CVE-2026-23091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: fix device leak on output open()\n\nMake sure to drop the reference taken when looking up the th device\nduring output device open() on errors and on close().\n\nNote that a recent commit fixed the leak in a couple of open() error\npaths but not all of them, and the reference is still leaking on\nsuccessful open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23091",
"url": "https://www.suse.com/security/cve/CVE-2026-23091"
},
{
"category": "external",
"summary": "SUSE Bug 1257813 for CVE-2026-23091",
"url": "https://bugzilla.suse.com/1257813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23091"
},
{
"cve": "CVE-2026-23094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix isolate sysfs check condition\n\nuacce supports the device isolation feature. If the driver\nimplements the isolate_err_threshold_read and\nisolate_err_threshold_write callback functions, uacce will create\nsysfs files now. Users can read and configure the isolation policy\nthrough sysfs. Currently, sysfs files are created as long as either\nisolate_err_threshold_read or isolate_err_threshold_write callback\nfunctions are present.\n\nHowever, accessing a non-existent callback function may cause the\nsystem to crash. Therefore, intercept the creation of sysfs if\nneither read nor write exists; create sysfs if either is supported,\nbut intercept unsupported operations at the call site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23094",
"url": "https://www.suse.com/security/cve/CVE-2026-23094"
},
{
"category": "external",
"summary": "SUSE Bug 1257811 for CVE-2026-23094",
"url": "https://bugzilla.suse.com/1257811"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23094"
},
{
"cve": "CVE-2026-23095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngue: Fix skb memleak with inner IP protocol 0.\n\nsyzbot reported skb memleak below. [0]\n\nThe repro generated a GUE packet with its inner protocol 0.\n\ngue_udp_recv() returns -guehdr-\u003eproto_ctype for \"resubmit\"\nin ip_protocol_deliver_rcu(), but this only works with\nnon-zero protocol number.\n\nLet\u0027s drop such packets.\n\nNote that 0 is a valid number (IPv6 Hop-by-Hop Option).\n\nI think it is not practical to encap HOPOPT in GUE, so once\nsomeone starts to complain, we could pass down a resubmit\nflag pointer to distinguish two zeros from the upper layer:\n\n * no error\n * resubmit HOPOPT\n\n[0]\nBUG: memory leak\nunreferenced object 0xffff888109695a00 (size 240):\n comm \"syz.0.17\", pid 6088, jiffies 4294943096\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00 .@..............\n backtrace (crc a84b336f):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270\n __build_skb+0x23/0x60 net/core/skbuff.c:474\n build_skb+0x20/0x190 net/core/skbuff.c:490\n __tun_build_skb drivers/net/tun.c:1541 [inline]\n tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636\n tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770\n tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x45d/0x710 fs/read_write.c:686\n ksys_write+0xa7/0x170 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23095",
"url": "https://www.suse.com/security/cve/CVE-2026-23095"
},
{
"category": "external",
"summary": "SUSE Bug 1257808 for CVE-2026-23095",
"url": "https://bugzilla.suse.com/1257808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23095"
},
{
"cve": "CVE-2026-23096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix cdev handling in the cleanup path\n\nWhen cdev_device_add fails, it internally releases the cdev memory,\nand if cdev_device_del is then executed, it will cause a hang error.\nTo fix it, we check the return value of cdev_device_add() and clear\nuacce-\u003ecdev to avoid calling cdev_device_del in the uacce_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23096",
"url": "https://www.suse.com/security/cve/CVE-2026-23096"
},
{
"category": "external",
"summary": "SUSE Bug 1257809 for CVE-2026-23096",
"url": "https://bugzilla.suse.com/1257809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23096"
},
{
"cve": "CVE-2026-23097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23097"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmigrate: correct lock ordering for hugetlb file folios\n\nSyzbot has found a deadlock (analyzed by Lance Yang):\n\n1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).\n2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire\nfolio_lock.\n\nmigrate_pages()\n -\u003e migrate_hugetlbs()\n -\u003e unmap_and_move_huge_page() \u003c- Takes folio_lock!\n -\u003e remove_migration_ptes()\n -\u003e __rmap_walk_file()\n -\u003e i_mmap_lock_read() \u003c- Waits for i_mmap_rwsem(read lock)!\n\nhugetlbfs_fallocate()\n -\u003e hugetlbfs_punch_hole() \u003c- Takes i_mmap_rwsem(write lock)!\n -\u003e hugetlbfs_zero_partial_page()\n -\u003e filemap_lock_hugetlb_folio()\n -\u003e filemap_lock_folio()\n -\u003e __filemap_get_folio \u003c- Waits for folio_lock!\n\nThe migration path is the one taking locks in the wrong order according to\nthe documentation at the top of mm/rmap.c. So expand the scope of the\nexisting i_mmap_lock to cover the calls to remove_migration_ptes() too.\n\nThis is (mostly) how it used to be after commit c0d0381ade79. That was\nremoved by 336bf30eb765 for both file \u0026 anon hugetlb pages when it should\nonly have been removed for anon hugetlb pages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23097",
"url": "https://www.suse.com/security/cve/CVE-2026-23097"
},
{
"category": "external",
"summary": "SUSE Bug 1257815 for CVE-2026-23097",
"url": "https://bugzilla.suse.com/1257815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23097"
},
{
"cve": "CVE-2026-23099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: limit BOND_MODE_8023AD to Ethernet devices\n\nBOND_MODE_8023AD makes sense for ARPHRD_ETHER only.\n\nsyzbot reported:\n\n BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\nRead of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497\n\nCPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G L syzkaller #0 PREEMPT(full)\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n check_region_inline mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\n __dev_mc_add net/core/dev_addr_lists.c:868 [inline]\n dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886\n bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180\n do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963\n do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165\n rtnl_changelink net/core/rtnetlink.c:3776 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3935 [inline]\n rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072\n rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958\n netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550\n netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]\n netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344\n netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n ____sys_sendmsg+0x505/0x820 net/socket.c:2592\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646\n __sys_sendmsg+0x164/0x220 net/socket.c:2678\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307\n do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n \u003c/TASK\u003e\n\nThe buggy address belongs to the variable:\n lacpdu_mcast_addr+0x0/0x40",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23099",
"url": "https://www.suse.com/security/cve/CVE-2026-23099"
},
{
"category": "external",
"summary": "SUSE Bug 1257816 for CVE-2026-23099",
"url": "https://bugzilla.suse.com/1257816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23099"
},
{
"cve": "CVE-2026-23100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23100"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix hugetlb_pmd_shared()\n\nPatch series \"mm/hugetlb: fixes for PMD table sharing (incl. using\nmmu_gather)\", v3.\n\nOne functional fix, one performance regression fix, and two related\ncomment fixes.\n\nI cleaned up my prototype I recently shared [1] for the performance fix,\ndeferring most of the cleanups I had in the prototype to a later point. \nWhile doing that I identified the other things.\n\nThe goal of this patch set is to be backported to stable trees \"fairly\"\neasily. At least patch #1 and #4.\n\nPatch #1 fixes hugetlb_pmd_shared() not detecting any sharing\nPatch #2 + #3 are simple comment fixes that patch #4 interacts with.\nPatch #4 is a fix for the reported performance regression due to excessive\nIPI broadcasts during fork()+exit().\n\nThe last patch is all about TLB flushes, IPIs and mmu_gather.\nRead: complicated\n\nThere are plenty of cleanups in the future to be had + one reasonable\noptimization on x86. But that\u0027s all out of scope for this series.\n\nRuntime tested, with a focus on fixing the performance regression using\nthe original reproducer [2] on x86.\n\n\nThis patch (of 4):\n\nWe switched from (wrongly) using the page count to an independent shared\ncount. Now, shared page tables have a refcount of 1 (excluding\nspeculative references) and instead use ptdesc-\u003ept_share_count to identify\nsharing.\n\nWe didn\u0027t convert hugetlb_pmd_shared(), so right now, we would never\ndetect a shared PMD table as such, because sharing/unsharing no longer\ntouches the refcount of a PMD table.\n\nPage migration, like mbind() or migrate_pages() would allow for migrating\nfolios mapped into such shared PMD tables, even though the folios are not\nexclusive. In smaps we would account them as \"private\" although they are\n\"shared\", and we would be wrongly setting the PM_MMAP_EXCLUSIVE in the\npagemap interface.\n\nFix it by properly using ptdesc_pmd_is_shared() in hugetlb_pmd_shared().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23100",
"url": "https://www.suse.com/security/cve/CVE-2026-23100"
},
{
"category": "external",
"summary": "SUSE Bug 1257817 for CVE-2026-23100",
"url": "https://bugzilla.suse.com/1257817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23100"
},
{
"cve": "CVE-2026-23101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: led-class: Only Add LED to leds_list when it is fully ready\n\nBefore this change the LED was added to leds_list before led_init_core()\ngets called adding it the list before led_classdev.set_brightness_work gets\ninitialized.\n\nThis leaves a window where led_trigger_register() of a LED\u0027s default\ntrigger will call led_trigger_set() which calls led_set_brightness()\nwhich in turn will end up queueing the *uninitialized*\nled_classdev.set_brightness_work.\n\nThis race gets hit by the lenovo-thinkpad-t14s EC driver which registers\n2 LEDs with a default trigger provided by snd_ctl_led.ko in quick\nsuccession. The first led_classdev_register() causes an async modprobe of\nsnd_ctl_led to run and that async modprobe manages to exactly hit\nthe window where the second LED is on the leds_list without led_init_core()\nbeing called for it, resulting in:\n\n ------------[ cut here ]------------\n WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390\n Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025\n ...\n Call trace:\n __flush_work+0x344/0x390 (P)\n flush_work+0x2c/0x50\n led_trigger_set+0x1c8/0x340\n led_trigger_register+0x17c/0x1c0\n led_trigger_register_simple+0x84/0xe8\n snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]\n do_one_initcall+0x5c/0x318\n do_init_module+0x9c/0x2b8\n load_module+0x7e0/0x998\n\nClose the race window by moving the adding of the LED to leds_list to\nafter the led_init_core() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23101",
"url": "https://www.suse.com/security/cve/CVE-2026-23101"
},
{
"category": "external",
"summary": "SUSE Bug 1257768 for CVE-2026-23101",
"url": "https://bugzilla.suse.com/1257768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23101"
},
{
"cve": "CVE-2026-23102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Fix restoration of SVE context\n\nWhen SME is supported, Restoring SVE signal context can go wrong in a\nfew ways, including placing the task into an invalid state where the\nkernel may read from out-of-bounds memory (and may potentially take a\nfatal fault) and/or may kill the task with a SIGKILL.\n\n(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into\n an invalid state where SVCR.SM is set (and sve_state is non-NULL)\n but TIF_SME is clear, consequently resuting in out-of-bounds memory\n reads and/or killing the task with SIGKILL.\n\n This can only occur in unusual (but legitimate) cases where the SVE\n signal context has either been modified by userspace or was saved in\n the context of another task (e.g. as with CRIU), as otherwise the\n presence of an SVE signal context with SVE_SIG_FLAG_SM implies that\n TIF_SME is already set.\n\n While in this state, task_fpsimd_load() will NOT configure SMCR_ELx\n (leaving some arbitrary value configured in hardware) before\n restoring SVCR and attempting to restore the streaming mode SVE\n registers from memory via sve_load_state(). As the value of\n SMCR_ELx.LEN may be larger than the task\u0027s streaming SVE vector\n length, this may read memory outside of the task\u0027s allocated\n sve_state, reading unrelated data and/or triggering a fault.\n\n While this can result in secrets being loaded into streaming SVE\n registers, these values are never exposed. As TIF_SME is clear,\n fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0\n accesses to streaming mode SVE registers, so these cannot be\n accessed directly at EL0. As fpsimd_save_user_state() verifies the\n live vector length before saving (S)SVE state to memory, no secret\n values can be saved back to memory (and hence cannot be observed via\n ptrace, signals, etc).\n\n When the live vector length doesn\u0027t match the expected vector length\n for the task, fpsimd_save_user_state() will send a fatal SIGKILL\n signal to the task. Hence the task may be killed after executing\n userspace for some period of time.\n\n(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the\n task\u0027s SVCR.SM. If SVCR.SM was set prior to restoring the context,\n then the task will be left in streaming mode unexpectedly, and some\n register state will be combined inconsistently, though the task will\n be left in legitimate state from the kernel\u0027s PoV.\n\n This can only occur in unusual (but legitimate) cases where ptrace\n has been used to set SVCR.SM after entry to the sigreturn syscall,\n as syscall entry clears SVCR.SM.\n\n In these cases, the the provided SVE register data will be loaded\n into the task\u0027s sve_state using the non-streaming SVE vector length\n and the FPSIMD registers will be merged into this using the\n streaming SVE vector length.\n\nFix (1) by setting TIF_SME when setting SVCR.SM. This also requires\nensuring that the task\u0027s sme_state has been allocated, but as this could\ncontain live ZA state, it should not be zeroed. Fix (2) by clearing\nSVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.\n\nFor consistency, I\u0027ve pulled the manipulation of SVCR, TIF_SVE, TIF_SME,\nand fp_type earlier, immediately after the allocation of\nsve_state/sme_state, before the restore of the actual register state.\nThis makes it easier to ensure that these are always modified\nconsistently, even if a fault is taken while reading the register data\nfrom the signal context. I do not expect any software to depend on the\nexact state restored when a fault is taken while reading the context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23102",
"url": "https://www.suse.com/security/cve/CVE-2026-23102"
},
{
"category": "external",
"summary": "SUSE Bug 1257772 for CVE-2026-23102",
"url": "https://bugzilla.suse.com/1257772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23102"
},
{
"cve": "CVE-2026-23104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix devlink reload call trace\n\nCommit 4da71a77fc3b (\"ice: read internal temperature sensor\") introduced\ninternal temperature sensor reading via HWMON. ice_hwmon_init() was added\nto ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a\nresult if devlink reload is used to reinit the device and then the driver\nis removed, a call trace can occur.\n\nBUG: unable to handle page fault for address: ffffffffc0fd4b5d\nCall Trace:\n string+0x48/0xe0\n vsnprintf+0x1f9/0x650\n sprintf+0x62/0x80\n name_show+0x1f/0x30\n dev_attr_show+0x19/0x60\n\nThe call trace repeats approximately every 10 minutes when system\nmonitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs\nattributes that reference freed module memory.\n\nThe sequence is:\n1. Driver load, ice_hwmon_init() gets called from ice_init_feature()\n2. Devlink reload down, flow does not call ice_remove()\n3. Devlink reload up, ice_hwmon_init() gets called from\n ice_init_feature() resulting in a second instance\n4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the\n first hwmon instance orphaned with dangling pointer\n\nFix this by moving ice_hwmon_exit() from ice_remove() to\nice_deinit_features() to ensure proper cleanup symmetry with\nice_hwmon_init().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23104",
"url": "https://www.suse.com/security/cve/CVE-2026-23104"
},
{
"category": "external",
"summary": "SUSE Bug 1257763 for CVE-2026-23104",
"url": "https://bugzilla.suse.com/1257763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23104"
},
{
"cve": "CVE-2026-23105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag\n\nThis is more of a preventive patch to make the code more consistent and\nto prevent possible exploits that employ child qlen manipulations on qfq.\nuse cl_is_active instead of relying on the child qdisc\u0027s qlen to determine\nclass activation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23105",
"url": "https://www.suse.com/security/cve/CVE-2026-23105"
},
{
"category": "external",
"summary": "SUSE Bug 1257775 for CVE-2026-23105",
"url": "https://bugzilla.suse.com/1257775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23105"
},
{
"cve": "CVE-2026-23107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Allocate SSVE storage when restoring ZA\n\nThe code to restore a ZA context doesn\u0027t attempt to allocate the task\u0027s\nsve_state before setting TIF_SME. Consequently, restoring a ZA context\ncan place a task into an invalid state where TIF_SME is set but the\ntask\u0027s sve_state is NULL.\n\nIn legitimate but uncommon cases where the ZA signal context was NOT\ncreated by the kernel in the context of the same task (e.g. if the task\nis saved/restored with something like CRIU), we have no guarantee that\nsve_state had been allocated previously. In these cases, userspace can\nenter streaming mode without trapping while sve_state is NULL, causing a\nlater NULL pointer dereference when the kernel attempts to store the\nregister state:\n\n| # ./sigreturn-za\n| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n| Mem abort info:\n| ESR = 0x0000000096000046\n| EC = 0x25: DABT (current EL), IL = 32 bits\n| SET = 0, FnV = 0\n| EA = 0, S1PTW = 0\n| FSC = 0x06: level 2 translation fault\n| Data abort info:\n| ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000\n| CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n| GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00\n| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000\n| Internal error: Oops: 0000000096000046 [#1] SMP\n| Modules linked in:\n| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT\n| Hardware name: linux,dummy-virt (DT)\n| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n| pc : sve_save_state+0x4/0xf0\n| lr : fpsimd_save_user_state+0xb0/0x1c0\n| sp : ffff80008070bcc0\n| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658\n| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000\n| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40\n| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000\n| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c\n| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020\n| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0\n| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48\n| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000\n| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440\n| Call trace:\n| sve_save_state+0x4/0xf0 (P)\n| fpsimd_thread_switch+0x48/0x198\n| __switch_to+0x20/0x1c0\n| __schedule+0x36c/0xce0\n| schedule+0x34/0x11c\n| exit_to_user_mode_loop+0x124/0x188\n| el0_interrupt+0xc8/0xd8\n| __el0_irq_handler_common+0x18/0x24\n| el0t_64_irq_handler+0x10/0x1c\n| el0t_64_irq+0x198/0x19c\n| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)\n| ---[ end trace 0000000000000000 ]---\n\nFix this by having restore_za_context() ensure that the task\u0027s sve_state\nis allocated, matching what we do when taking an SME trap. Any live\nSVE/SSVE state (which is restored earlier from a separate signal\ncontext) must be preserved, and hence this is not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23107",
"url": "https://www.suse.com/security/cve/CVE-2026-23107"
},
{
"category": "external",
"summary": "SUSE Bug 1257762 for CVE-2026-23107",
"url": "https://bugzilla.suse.com/1257762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23107"
},
{
"cve": "CVE-2026-23108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn usb_8dev_open() -\u003e usb_8dev_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback usb_8dev_read_bulk_callback(), the URBs are processed and\nresubmitted. In usb_8dev_close() -\u003e unlink_all_urbs() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nusb_8dev_read_bulk_callback() to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23108",
"url": "https://www.suse.com/security/cve/CVE-2026-23108"
},
{
"category": "external",
"summary": "SUSE Bug 1257770 for CVE-2026-23108",
"url": "https://bugzilla.suse.com/1257770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23108"
},
{
"cve": "CVE-2026-23110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Wake up the error handler when final completions race against each other\n\nThe fragile ordering between marking commands completed or failed so\nthat the error handler only wakes when the last running command\ncompletes or times out has race conditions. These race conditions can\ncause the SCSI layer to fail to wake the error handler, leaving I/O\nthrough the SCSI host stuck as the error state cannot advance.\n\nFirst, there is an memory ordering issue within scsi_dec_host_busy().\nThe write which clears SCMD_STATE_INFLIGHT may be reordered with reads\ncounting in scsi_host_busy(). While the local CPU will see its own\nwrite, reordering can allow other CPUs in scsi_dec_host_busy() or\nscsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to\nsee a host busy equal to the host_failed count.\n\nThis race condition can be prevented with a memory barrier on the error\npath to force the write to be visible before counting host busy\ncommands.\n\nSecond, there is a general ordering issue with scsi_eh_inc_host_failed(). By\ncounting busy commands before incrementing host_failed, it can race with a\nfinal command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does\nnot see host_failed incremented but scsi_eh_inc_host_failed() counts busy\ncommands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),\nresulting in neither waking the error handler task.\n\nThis needs the call to scsi_host_busy() to be moved after host_failed is\nincremented to close the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23110",
"url": "https://www.suse.com/security/cve/CVE-2026-23110"
},
{
"category": "external",
"summary": "SUSE Bug 1257761 for CVE-2026-23110",
"url": "https://bugzilla.suse.com/1257761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23110"
},
{
"cve": "CVE-2026-23111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don\u0027t need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter-\u003egenmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain-\u003euse reference count. Each abort cycle\npermanently decrements chain-\u003euse. Once chain-\u003euse reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23111",
"url": "https://www.suse.com/security/cve/CVE-2026-23111"
},
{
"category": "external",
"summary": "SUSE Bug 1258181 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "external",
"summary": "SUSE Bug 1258183 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec\n\nnvmet_tcp_build_pdu_iovec() could walk past cmd-\u003ereq.sg when a PDU\nlength or offset exceeds sg_cnt and then use bogus sg-\u003elength/offset\nvalues, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining\nentries, and sg-\u003elength/offset before building the bvec.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23112",
"url": "https://www.suse.com/security/cve/CVE-2026-23112"
},
{
"category": "external",
"summary": "SUSE Bug 1258184 for CVE-2026-23112",
"url": "https://bugzilla.suse.com/1258184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23116",
"url": "https://www.suse.com/security/cve/CVE-2026-23116"
},
{
"category": "external",
"summary": "SUSE Bug 1258277 for CVE-2026-23116",
"url": "https://bugzilla.suse.com/1258277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: provide a net pointer to __skb_flow_dissect()\n\nAfter 3cbf4ffba5ee (\"net: plumb network namespace into __skb_flow_dissect\")\nwe have to provide a net pointer to __skb_flow_dissect(),\neither via skb-\u003edev, skb-\u003esk, or a user provided pointer.\n\nIn the following case, syzbot was able to cook a bare skb.\n\nWARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053\nCall Trace:\n \u003cTASK\u003e\n bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]\n __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157\n bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]\n bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]\n bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515\n xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388\n bpf_prog_run_xdp include/net/xdp.h:700 [inline]\n bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421\n bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390\n bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703\n __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182\n __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23119",
"url": "https://www.suse.com/security/cve/CVE-2026-23119"
},
{
"category": "external",
"summary": "SUSE Bug 1258273 for CVE-2026-23119",
"url": "https://bugzilla.suse.com/1258273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: annotate data-race around dev-\u003ework\n\ndev-\u003ework can re read locklessly in mISDN_read()\nand mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.\n\nBUG: KCSAN: data-race in mISDN_ioctl / mISDN_read\n\nwrite to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:\n misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]\n mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583\n __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583\n x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:\n mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112\n do_loop_readv_writev fs/read_write.c:847 [inline]\n vfs_readv+0x3fb/0x690 fs/read_write.c:1020\n do_readv+0xe7/0x210 fs/read_write.c:1080\n __do_sys_readv fs/read_write.c:1165 [inline]\n __se_sys_readv fs/read_write.c:1162 [inline]\n __x64_sys_readv+0x45/0x50 fs/read_write.c:1162\n x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nvalue changed: 0x00000000 -\u003e 0x00000001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23121",
"url": "https://www.suse.com/security/cve/CVE-2026-23121"
},
{
"category": "external",
"summary": "SUSE Bug 1258309 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "external",
"summary": "SUSE Bug 1259135 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1259135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23123"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninterconnect: debugfs: initialize src_node and dst_node to empty strings\n\nThe debugfs_create_str() API assumes that the string pointer is either NULL\nor points to valid kmalloc() memory. Leaving the pointer uninitialized can\ncause problems.\n\nInitialize src_node and dst_node to empty strings before creating the\ndebugfs entries to guarantee that reads and writes are safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23123",
"url": "https://www.suse.com/security/cve/CVE-2026-23123"
},
{
"category": "external",
"summary": "SUSE Bug 1258276 for CVE-2026-23123",
"url": "https://bugzilla.suse.com/1258276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23123"
},
{
"cve": "CVE-2026-23128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23128"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: Set __nocfi on swsusp_arch_resume()\n\nA DABT is reported[1] on an android based system when resume from hiberate.\nThis happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()\nand does not have a CFI hash, but swsusp_arch_resume() will attempt to\nverify the CFI hash when calling a copy of swsusp_arch_suspend_exit().\n\nGiven that there\u0027s an existing requirement that the entrypoint to\nswsusp_arch_suspend_exit() is the first byte of the .hibernate_exit.text\nsection, we cannot fix this by marking swsusp_arch_suspend_exit() with\nSYM_FUNC_*(). The simplest fix for now is to disable the CFI check in\nswsusp_arch_resume().\n\nMark swsusp_arch_resume() as __nocfi to disable the CFI check.\n\n[1]\n[ 22.991934][ T1] Unable to handle kernel paging request at virtual address 0000000109170ffc\n[ 22.991934][ T1] Mem abort info:\n[ 22.991934][ T1] ESR = 0x0000000096000007\n[ 22.991934][ T1] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 22.991934][ T1] SET = 0, FnV = 0\n[ 22.991934][ T1] EA = 0, S1PTW = 0\n[ 22.991934][ T1] FSC = 0x07: level 3 translation fault\n[ 22.991934][ T1] Data abort info:\n[ 22.991934][ T1] ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n[ 22.991934][ T1] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 22.991934][ T1] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 22.991934][ T1] [0000000109170ffc] user address but active_mm is swapper\n[ 22.991934][ T1] Internal error: Oops: 0000000096000007 [#1] PREEMPT SMP\n[ 22.991934][ T1] Dumping ftrace buffer:\n[ 22.991934][ T1] (ftrace buffer empty)\n[ 22.991934][ T1] Modules linked in:\n[ 22.991934][ T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.98-android15-8-g0b1d2aee7fc3-dirty-4k #1 688c7060a825a3ac418fe53881730b355915a419\n[ 22.991934][ T1] Hardware name: Unisoc UMS9360-base Board (DT)\n[ 22.991934][ T1] pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 22.991934][ T1] pc : swsusp_arch_resume+0x2ac/0x344\n[ 22.991934][ T1] lr : swsusp_arch_resume+0x294/0x344\n[ 22.991934][ T1] sp : ffffffc08006b960\n[ 22.991934][ T1] x29: ffffffc08006b9c0 x28: 0000000000000000 x27: 0000000000000000\n[ 22.991934][ T1] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000820\n[ 22.991934][ T1] x23: ffffffd0817e3000 x22: ffffffd0817e3000 x21: 0000000000000000\n[ 22.991934][ T1] x20: ffffff8089171000 x19: ffffffd08252c8c8 x18: ffffffc080061058\n[ 22.991934][ T1] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000004\n[ 22.991934][ T1] x14: ffffff8178c88000 x13: 0000000000000006 x12: 0000000000000000\n[ 22.991934][ T1] x11: 0000000000000015 x10: 0000000000000001 x9 : ffffffd082533000\n[ 22.991934][ T1] x8 : 0000000109171000 x7 : 205b5d3433393139 x6 : 392e32322020205b\n[ 22.991934][ T1] x5 : 000000010916f000 x4 : 000000008164b000 x3 : ffffff808a4e0530\n[ 22.991934][ T1] x2 : ffffffd08058e784 x1 : 0000000082326000 x0 : 000000010a283000\n[ 22.991934][ T1] Call trace:\n[ 22.991934][ T1] swsusp_arch_resume+0x2ac/0x344\n[ 22.991934][ T1] hibernation_restore+0x158/0x18c\n[ 22.991934][ T1] load_image_and_restore+0xb0/0xec\n[ 22.991934][ T1] software_resume+0xf4/0x19c\n[ 22.991934][ T1] software_resume_initcall+0x34/0x78\n[ 22.991934][ T1] do_one_initcall+0xe8/0x370\n[ 22.991934][ T1] do_initcall_level+0xc8/0x19c\n[ 22.991934][ T1] do_initcalls+0x70/0xc0\n[ 22.991934][ T1] do_basic_setup+0x1c/0x28\n[ 22.991934][ T1] kernel_init_freeable+0xe0/0x148\n[ 22.991934][ T1] kernel_init+0x20/0x1a8\n[ 22.991934][ T1] ret_from_fork+0x10/0x20\n[ 22.991934][ T1] Code: a9400a61 f94013e0 f9438923 f9400a64 (b85fc110)\n\n[catalin.marinas@arm.com: commit log updated by Mark Rutland]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23128",
"url": "https://www.suse.com/security/cve/CVE-2026-23128"
},
{
"category": "external",
"summary": "SUSE Bug 1258298 for CVE-2026-23128",
"url": "https://bugzilla.suse.com/1258298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23128"
},
{
"cve": "CVE-2026-23129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: Prevent duplicate registrations\n\nModify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()\nto reject duplicate registration attempts.\n\nPreviously, if a caller attempted to register the same pin multiple\ntimes (with the same ops, priv, and cookie) on the same device, the core\nsilently increments the reference count and return success. This behavior\nis incorrect because if the caller makes these duplicate registrations\nthen for the first one dpll_pin_registration is allocated and for others\nthe associated dpll_pin_ref.refcount is incremented. During the first\nunregistration the associated dpll_pin_registration is freed and for\nothers WARN is fired.\n\nFix this by updating the logic to return `-EEXIST` if a matching\nregistration is found to enforce a strict \"register once\" policy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23129",
"url": "https://www.suse.com/security/cve/CVE-2026-23129"
},
{
"category": "external",
"summary": "SUSE Bug 1258299 for CVE-2026-23129",
"url": "https://bugzilla.suse.com/1258299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names\n\nThe hp-bioscfg driver attempts to register kobjects with empty names when\nthe HP BIOS returns attributes with empty name strings. This causes\nmultiple kernel warnings:\n\n kobject: (00000000135fb5e6): attempted to be registered with empty name!\n WARNING: CPU: 14 PID: 3336 at lib/kobject.c:219 kobject_add_internal+0x2eb/0x310\n\nAdd validation in hp_init_bios_buffer_attribute() to check if the\nattribute name is empty after parsing it from the WMI buffer. If empty,\nlog a debug message and skip registration of that attribute, allowing the\nmodule to continue processing other valid attributes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23131",
"url": "https://www.suse.com/security/cve/CVE-2026-23131"
},
{
"category": "external",
"summary": "SUSE Bug 1258297 for CVE-2026-23131",
"url": "https://bugzilla.suse.com/1258297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23131"
},
{
"cve": "CVE-2026-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23133",
"url": "https://www.suse.com/security/cve/CVE-2026-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1258249 for CVE-2026-23133",
"url": "https://bugzilla.suse.com/1258249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23135",
"url": "https://www.suse.com/security/cve/CVE-2026-23135"
},
{
"category": "external",
"summary": "SUSE Bug 1258245 for CVE-2026-23135",
"url": "https://bugzilla.suse.com/1258245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: reset sparse-read state in osd_fault()\n\nWhen a fault occurs, the connection is abandoned, reestablished, and any\npending operations are retried. The OSD client tracks the progress of a\nsparse-read reply using a separate state machine, largely independent of\nthe messenger\u0027s state.\n\nIf a connection is lost mid-payload or the sparse-read state machine\nreturns an error, the sparse-read state is not reset. The OSD client\nwill then interpret the beginning of a new reply as the continuation of\nthe old one. If this makes the sparse-read machinery enter a failure\nstate, it may never recover, producing loops like:\n\n libceph: [0] got 0 extents\n libceph: data len 142248331 != extent len 0\n libceph: osd0 (1)...:6801 socket error on read\n libceph: data len 142248331 != extent len 0\n libceph: osd0 (1)...:6801 socket error on read\n\nTherefore, reset the sparse-read state in osd_fault(), ensuring retries\nstart from a clean state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23136",
"url": "https://www.suse.com/security/cve/CVE-2026-23136"
},
{
"category": "external",
"summary": "SUSE Bug 1258303 for CVE-2026-23136",
"url": "https://bugzilla.suse.com/1258303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23136"
},
{
"cve": "CVE-2026-23137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23137"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: unittest: Fix memory leak in unittest_data_add()\n\nIn unittest_data_add(), if of_resolve_phandles() fails, the allocated\nunittest_data is not freed, leading to a memory leak.\n\nFix this by using scope-based cleanup helper __free(kfree) for automatic\nresource cleanup. This ensures unittest_data is automatically freed when\nit goes out of scope in error paths.\n\nFor the success path, use retain_and_null_ptr() to transfer ownership\nof the memory to the device tree and prevent double freeing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23137",
"url": "https://www.suse.com/security/cve/CVE-2026-23137"
},
{
"category": "external",
"summary": "SUSE Bug 1258232 for CVE-2026-23137",
"url": "https://bugzilla.suse.com/1258232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23137"
},
{
"cve": "CVE-2026-23139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: update last_gc only when GC has been performed\n\nCurrently last_gc is being updated everytime a new connection is\ntracked, that means that it is updated even if a GC wasn\u0027t performed.\nWith a sufficiently high packet rate, it is possible to always bypass\nthe GC, causing the list to grow infinitely.\n\nUpdate the last_gc value only when a GC has been actually performed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23139",
"url": "https://www.suse.com/security/cve/CVE-2026-23139"
},
{
"category": "external",
"summary": "SUSE Bug 1258304 for CVE-2026-23139",
"url": "https://bugzilla.suse.com/1258304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: check for inline extents in range_is_hole_in_parent()\n\nBefore accessing the disk_bytenr field of a file extent item we need\nto check if we are dealing with an inline extent.\nThis is because for inline extents their data starts at the offset of\nthe disk_bytenr field. So accessing the disk_bytenr\nmeans we are accessing inline data or in case the inline data is less\nthan 8 bytes we can actually cause an invalid\nmemory access if this inline extent item is the first item in the leaf\nor access metadata from other items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23141",
"url": "https://www.suse.com/security/cve/CVE-2026-23141"
},
{
"category": "external",
"summary": "SUSE Bug 1258377 for CVE-2026-23141",
"url": "https://bugzilla.suse.com/1258377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure\n\nWhen a DAMOS-scheme DAMON sysfs directory setup fails after setup of\naccess_pattern/ directory, subdirectories of access_pattern/ directory are\nnot cleaned up. As a result, DAMON sysfs interface is nearly broken until\nthe system reboots, and the memory for the unremoved directory is leaked.\n\nCleanup the directories under such failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23142",
"url": "https://www.suse.com/security/cve/CVE-2026-23142"
},
{
"category": "external",
"summary": "SUSE Bug 1258289 for CVE-2026-23142",
"url": "https://bugzilla.suse.com/1258289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23142"
},
{
"cve": "CVE-2026-23144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23144"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/sysfs: cleanup attrs subdirs on context dir setup failure\n\nWhen a context DAMON sysfs directory setup is failed after setup of attrs/\ndirectory, subdirectories of attrs/ directory are not cleaned up. As a\nresult, DAMON sysfs interface is nearly broken until the system reboots,\nand the memory for the unremoved directory is leaked.\n\nCleanup the directories under such failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23144",
"url": "https://www.suse.com/security/cve/CVE-2026-23144"
},
{
"category": "external",
"summary": "SUSE Bug 1258290 for CVE-2026-23144",
"url": "https://bugzilla.suse.com/1258290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23144"
},
{
"cve": "CVE-2026-23145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix iloc.bh leak in ext4_xattr_inode_update_ref\n\nThe error branch for ext4_xattr_inode_update_ref forget to release the\nrefcount for iloc.bh. Find this when review code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23145",
"url": "https://www.suse.com/security/cve/CVE-2026-23145"
},
{
"category": "external",
"summary": "SUSE Bug 1258326 for CVE-2026-23145",
"url": "https://bugzilla.suse.com/1258326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work\n\nhci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling\nhci_uart_register_dev(), which calls proto-\u003eopen() to initialize\nhu-\u003epriv. However, if a TTY write wakeup occurs during this window,\nhci_uart_tx_wakeup() may schedule write_work before hu-\u003epriv is\ninitialized, leading to a NULL pointer dereference in\nhci_uart_write_work() when proto-\u003edequeue() accesses hu-\u003epriv.\n\nThe race condition is:\n\n CPU0 CPU1\n ---- ----\n hci_uart_set_proto()\n set_bit(HCI_UART_PROTO_INIT)\n hci_uart_register_dev()\n tty write wakeup\n hci_uart_tty_wakeup()\n hci_uart_tx_wakeup()\n schedule_work(\u0026hu-\u003ewrite_work)\n proto-\u003eopen(hu)\n // initializes hu-\u003epriv\n hci_uart_write_work()\n hci_uart_dequeue()\n proto-\u003edequeue(hu)\n // accesses hu-\u003epriv (NULL!)\n\nFix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-\u003eopen()\nsucceeds, ensuring hu-\u003epriv is initialized before any work can be\nscheduled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23146",
"url": "https://www.suse.com/security/cve/CVE-2026-23146"
},
{
"category": "external",
"summary": "SUSE Bug 1258234 for CVE-2026-23146",
"url": "https://bugzilla.suse.com/1258234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference\n\nThere is a race condition in nvmet_bio_done() that can cause a NULL\npointer dereference in blk_cgroup_bio_start():\n\n1. nvmet_bio_done() is called when a bio completes\n2. nvmet_req_complete() is called, which invokes req-\u003eops-\u003equeue_response(req)\n3. The queue_response callback can re-queue and re-submit the same request\n4. The re-submission reuses the same inline_bio from nvmet_req\n5. Meanwhile, nvmet_req_bio_put() (called after nvmet_req_complete)\n invokes bio_uninit() for inline_bio, which sets bio-\u003ebi_blkg to NULL\n6. The re-submitted bio enters submit_bio_noacct_nocheck()\n7. blk_cgroup_bio_start() dereferences bio-\u003ebi_blkg, causing a crash:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000028\n #PF: supervisor read access in kernel mode\n RIP: 0010:blk_cgroup_bio_start+0x10/0xd0\n Call Trace:\n submit_bio_noacct_nocheck+0x44/0x250\n nvmet_bdev_execute_rw+0x254/0x370 [nvmet]\n process_one_work+0x193/0x3c0\n worker_thread+0x281/0x3a0\n\nFix this by reordering nvmet_bio_done() to call nvmet_req_bio_put()\nBEFORE nvmet_req_complete(). This ensures the bio is cleaned up before\nthe request can be re-submitted, preventing the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23148",
"url": "https://www.suse.com/security/cve/CVE-2026-23148"
},
{
"category": "external",
"summary": "SUSE Bug 1258258 for CVE-2026-23148",
"url": "https://bugzilla.suse.com/1258258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23148"
},
{
"cve": "CVE-2026-23150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23150"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().\n\nsyzbot reported various memory leaks related to NFC, struct\nnfc_llcp_sock, sk_buff, nfc_dev, etc. [0]\n\nThe leading log hinted that nfc_llcp_send_ui_frame() failed\nto allocate skb due to sock_error(sk) being -ENXIO.\n\nENXIO is set by nfc_llcp_socket_release() when struct\nnfc_llcp_local is destroyed by local_cleanup().\n\nThe problem is that there is no synchronisation between\nnfc_llcp_send_ui_frame() and local_cleanup(), and skb\ncould be put into local-\u003etx_queue after it was purged in\nlocal_cleanup():\n\n CPU1 CPU2\n ---- ----\n nfc_llcp_send_ui_frame() local_cleanup()\n |- do { \u0027\n |- pdu = nfc_alloc_send_skb(..., \u0026err)\n | .\n | |- nfc_llcp_socket_release(local, false, ENXIO);\n | |- skb_queue_purge(\u0026local-\u003etx_queue); |\n | \u0027 |\n |- skb_queue_tail(\u0026local-\u003etx_queue, pdu); |\n ... |\n |- pdu = nfc_alloc_send_skb(..., \u0026err) |\n ^._________________________________.\u0027\n\nlocal_cleanup() is called for struct nfc_llcp_local only\nafter nfc_llcp_remove_local() unlinks it from llcp_devices.\n\nIf we hold local-\u003etx_queue.lock then, we can synchronise\nthe thread and nfc_llcp_send_ui_frame().\n\nLet\u0027s do that and check list_empty(\u0026local-\u003elist) before\nqueuing skb to local-\u003etx_queue in nfc_llcp_send_ui_frame().\n\n[0]:\n[ 56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)\n[ 64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nBUG: memory leak\nunreferenced object 0xffff8881272f6800 (size 1024):\n comm \"syz.0.17\", pid 6096, jiffies 4294942766\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00 \u0027..@............\n backtrace (crc da58d84d):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n __do_kmalloc_node mm/slub.c:5645 [inline]\n __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658\n kmalloc_noprof include/linux/slab.h:961 [inline]\n sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239\n sk_alloc+0x36/0x360 net/core/sock.c:2295\n nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979\n llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044\n nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31\n __sock_create+0x1a9/0x340 net/socket.c:1605\n sock_create net/socket.c:1663 [inline]\n __sys_socket_create net/socket.c:1700 [inline]\n __sys_socket+0xb9/0x1a0 net/socket.c:1747\n __do_sys_socket net/socket.c:1761 [inline]\n __se_sys_socket net/socket.c:1759 [inline]\n __x64_sys_socket+0x1b/0x30 net/socket.c:1759\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBUG: memory leak\nunreferenced object 0xffff88810fbd9800 (size 240):\n comm \"syz.0.17\", pid 6096, jiffies 4294942850\n hex dump (first 32 bytes):\n 68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff h.......h.......\n 00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff .........h/\u0027....\n backtrace (crc 6cc652b1):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336\n __alloc_skb+0x203/0x240 net/core/skbuff.c:660\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0x69/0x3f0 net/core/sk\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23150",
"url": "https://www.suse.com/security/cve/CVE-2026-23150"
},
{
"category": "external",
"summary": "SUSE Bug 1258354 for CVE-2026-23150",
"url": "https://bugzilla.suse.com/1258354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23151"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix memory leak in set_ssp_complete\n\nFix memory leak in set_ssp_complete() where mgmt_pending_cmd structures\nare not freed after being removed from the pending list.\n\nCommit 302a1f674c00 (\"Bluetooth: MGMT: Fix possible UAFs\") replaced\nmgmt_pending_foreach() calls with individual command handling but missed\nadding mgmt_pending_free() calls in both error and success paths of\nset_ssp_complete(). Other completion functions like set_le_complete()\nwere fixed correctly in the same commit.\n\nThis causes a memory leak of the mgmt_pending_cmd structure and its\nassociated parameter data for each SSP command that completes.\n\nAdd the missing mgmt_pending_free(cmd) calls in both code paths to fix\nthe memory leak. Also fix the same issue in set_advertising_complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23151",
"url": "https://www.suse.com/security/cve/CVE-2026-23151"
},
{
"category": "external",
"summary": "SUSE Bug 1258237 for CVE-2026-23151",
"url": "https://bugzilla.suse.com/1258237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23152"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: correctly decode TTLM with default link map\n\nTID-To-Link Mapping (TTLM) elements do not contain any link mapping\npresence indicator if a default mapping is used and parsing needs to be\nskipped.\n\nNote that access points should not explicitly report an advertised TTLM\nwith a default mapping as that is the implied mapping if the element is\nnot included, this is even the case when switching back to the default\nmapping. However, mac80211 would incorrectly parse the frame and would\nalso read one byte beyond the end of the element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23152",
"url": "https://www.suse.com/security/cve/CVE-2026-23152"
},
{
"category": "external",
"summary": "SUSE Bug 1258252 for CVE-2026-23152",
"url": "https://bugzilla.suse.com/1258252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix segmentation of forwarding fraglist GRO\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT\u0027s IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23154",
"url": "https://www.suse.com/security/cve/CVE-2026-23154"
},
{
"category": "external",
"summary": "SUSE Bug 1258286 for CVE-2026-23154",
"url": "https://bugzilla.suse.com/1258286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23155"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\n\nSinc commit 79a6d1bfe114 (\"can: gs_usb: gs_usb_receive_bulk_callback():\nunanchor URL on usb_submit_urb() error\") a failing resubmit URB will print\nan info message.\n\nIn the case of a short read where netdev has not yet been assigned,\ninitialize as NULL to avoid dereferencing an undefined value. Also report\nthe error value of the failed resubmit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23155",
"url": "https://www.suse.com/security/cve/CVE-2026-23155"
},
{
"category": "external",
"summary": "SUSE Bug 1258313 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "external",
"summary": "SUSE Bug 1258315 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23155"
},
{
"cve": "CVE-2026-23156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: fix error propagation in efivar_entry_get()\n\nefivar_entry_get() always returns success even if the underlying\n__efivar_entry_get() fails, masking errors.\n\nThis may result in uninitialized heap memory being copied to userspace\nin the efivarfs_file_read() path.\n\nFix it by returning the error from __efivar_entry_get().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23156",
"url": "https://www.suse.com/security/cve/CVE-2026-23156"
},
{
"category": "external",
"summary": "SUSE Bug 1258317 for CVE-2026-23156",
"url": "https://bugzilla.suse.com/1258317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not strictly require dirty metadata threshold for metadata writepages\n\n[BUG]\nThere is an internal report that over 1000 processes are\nwaiting at the io_schedule_timeout() of balance_dirty_pages(), causing\na system hang and trigger a kernel coredump.\n\nThe kernel is v6.4 kernel based, but the root problem still applies to\nany upstream kernel before v6.18.\n\n[CAUSE]\nFrom Jan Kara for his wisdom on the dirty page balance behavior first.\n\n This cgroup dirty limit was what was actually playing the role here\n because the cgroup had only a small amount of memory and so the dirty\n limit for it was something like 16MB.\n\n Dirty throttling is responsible for enforcing that nobody can dirty\n (significantly) more dirty memory than there\u0027s dirty limit. Thus when\n a task is dirtying pages it periodically enters into balance_dirty_pages()\n and we let it sleep there to slow down the dirtying.\n\n When the system is over dirty limit already (either globally or within\n a cgroup of the running task), we will not let the task exit from\n balance_dirty_pages() until the number of dirty pages drops below the\n limit.\n\n So in this particular case, as I already mentioned, there was a cgroup\n with relatively small amount of memory and as a result with dirty limit\n set at 16MB. A task from that cgroup has dirtied about 28MB worth of\n pages in btrfs btree inode and these were practically the only dirty\n pages in that cgroup.\n\nSo that means the only way to reduce the dirty pages of that cgroup is\nto writeback the dirty pages of btrfs btree inode, and only after that\nthose processes can exit balance_dirty_pages().\n\nNow back to the btrfs part, btree_writepages() is responsible for\nwriting back dirty btree inode pages.\n\nThe problem here is, there is a btrfs internal threshold that if the\nbtree inode\u0027s dirty bytes are below the 32M threshold, it will not\ndo any writeback.\n\nThis behavior is to batch as much metadata as possible so we won\u0027t write\nback those tree blocks and then later re-COW them again for another\nmodification.\n\nThis internal 32MiB is higher than the existing dirty page size (28MiB),\nmeaning no writeback will happen, causing a deadlock between btrfs and\ncgroup:\n\n- Btrfs doesn\u0027t want to write back btree inode until more dirty pages\n\n- Cgroup/MM doesn\u0027t want more dirty pages for btrfs btree inode\n Thus any process touching that btree inode is put into sleep until\n the number of dirty pages is reduced.\n\nThanks Jan Kara a lot for the analysis of the root cause.\n\n[ENHANCEMENT]\nSince kernel commit b55102826d7d (\"btrfs: set AS_KERNEL_FILE on the\nbtree_inode\"), btrfs btree inode pages will only be charged to the root\ncgroup which should have a much larger limit than btrfs\u0027 32MiB\nthreshold.\nSo it should not affect newer kernels.\n\nBut for all current LTS kernels, they are all affected by this problem,\nand backporting the whole AS_KERNEL_FILE may not be a good idea.\n\nEven for newer kernels I still think it\u0027s a good idea to get\nrid of the internal threshold at btree_writepages(), since for most cases\ncgroup/MM has a better view of full system memory usage than btrfs\u0027 fixed\nthreshold.\n\nFor internal callers using btrfs_btree_balance_dirty() since that\nfunction is already doing internal threshold check, we don\u0027t need to\nbother them.\n\nBut for external callers of btree_writepages(), just respect their\nrequests and write back whatever they want, ignoring the internal\nbtrfs threshold to avoid such deadlock on btree inode dirty page\nbalancing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23157",
"url": "https://www.suse.com/security/cve/CVE-2026-23157"
},
{
"category": "external",
"summary": "SUSE Bug 1258376 for CVE-2026-23157",
"url": "https://bugzilla.suse.com/1258376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: virtuser: fix UAF in configfs release path\n\nThe gpio-virtuser configfs release path uses guard(mutex) to protect\nthe device structure. However, the device is freed before the guard\ncleanup runs, causing mutex_unlock() to operate on freed memory.\n\nSpecifically, gpio_virtuser_device_config_group_release() destroys\nthe mutex and frees the device while still inside the guard(mutex)\nscope. When the function returns, the guard cleanup invokes\nmutex_unlock(\u0026dev-\u003elock), resulting in a slab use-after-free.\n\nLimit the mutex lifetime by using a scoped_guard() only around the\nactivation check, so that the lock is released before mutex_destroy()\nand kfree() are called.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23158",
"url": "https://www.suse.com/security/cve/CVE-2026-23158"
},
{
"category": "external",
"summary": "SUSE Bug 1258323 for CVE-2026-23158",
"url": "https://bugzilla.suse.com/1258323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23158"
},
{
"cve": "CVE-2026-23161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/shmem, swap: fix race of truncate and swap entry split\n\nThe helper for shmem swap freeing is not handling the order of swap\nentries correctly. It uses xa_cmpxchg_irq to erase the swap entry, but it\ngets the entry order before that using xa_get_order without lock\nprotection, and it may get an outdated order value if the entry is split\nor changed in other ways after the xa_get_order and before the\nxa_cmpxchg_irq.\n\nAnd besides, the order could grow and be larger than expected, and cause\ntruncation to erase data beyond the end border. For example, if the\ntarget entry and following entries are swapped in or freed, then a large\nfolio was added in place and swapped out, using the same entry, the\nxa_cmpxchg_irq will still succeed, it\u0027s very unlikely to happen though.\n\nTo fix that, open code the Xarray cmpxchg and put the order retrieval and\nvalue checking in the same critical section. Also, ensure the order won\u0027t\nexceed the end border, skip it if the entry goes across the border.\n\nSkipping large swap entries crosses the end border is safe here. Shmem\ntruncate iterates the range twice, in the first iteration,\nfind_lock_entries already filtered such entries, and shmem will swapin the\nentries that cross the end border and partially truncate the folio (split\nthe folio or at least zero part of it). So in the second loop here, if we\nsee a swap entry that crosses the end order, it must at least have its\ncontent erased already.\n\nI observed random swapoff hangs and kernel panics when stress testing\nZSWAP with shmem. After applying this patch, all problems are gone.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23161",
"url": "https://www.suse.com/security/cve/CVE-2026-23161"
},
{
"category": "external",
"summary": "SUSE Bug 1258355 for CVE-2026-23161",
"url": "https://bugzilla.suse.com/1258355"
},
{
"category": "external",
"summary": "SUSE Bug 1259134 for CVE-2026-23161",
"url": "https://bugzilla.suse.com/1259134"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23161"
},
{
"cve": "CVE-2026-23163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove\n\nOn APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and\nih2 interrupt ring buffers are not initialized. This is by design, as\nthese secondary IH rings are only available on discrete GPUs. See\nvega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when\nAMD_IS_APU is set.\n\nHowever, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to\nget the timestamp of the last interrupt entry. When retry faults are\nenabled on APUs (noretry=0), this function is called from the SVM page\nfault recovery path, resulting in a NULL pointer dereference when\namdgpu_ih_decode_iv_ts_helper() attempts to access ih-\u003ering[].\n\nThe crash manifests as:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000004\n RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]\n Call Trace:\n amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]\n svm_range_restore_pages+0xae5/0x11c0 [amdgpu]\n amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]\n gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]\n amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]\n amdgpu_ih_process+0x84/0x100 [amdgpu]\n\nThis issue was exposed by commit 1446226d32a4 (\"drm/amdgpu: Remove GC HW\nIP 9.3.0 from noretry=1\") which changed the default for Renoir APU from\nnoretry=1 to noretry=0, enabling retry fault handling and thus\nexercising the buggy code path.\n\nFix this by adding a check for ih1.ring_size before attempting to use\nit. Also restore the soft_ih support from commit dd299441654f (\"drm/amdgpu:\nRework retry fault removal\"). This is needed if the hardware doesn\u0027t\nsupport secondary HW IH rings.\n\nv2: additional updates (Alex)\n\n(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23163",
"url": "https://www.suse.com/security/cve/CVE-2026-23163"
},
{
"category": "external",
"summary": "SUSE Bug 1258544 for CVE-2026-23163",
"url": "https://bugzilla.suse.com/1258544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix NULL pointer dereference in ice_vsi_set_napi_queues\n\nAdd NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes\nduring resume from suspend when rings[q_idx]-\u003eq_vector is NULL.\n\nTested adaptor:\n60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)\n Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]\n\nSR-IOV state: both disabled and enabled can reproduce this issue.\n\nkernel version: v6.18\n\nReproduce steps:\nBoot up and execute suspend like systemctl suspend or rtcwake.\n\nLog:\n\u003c1\u003e[ 231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040\n\u003c1\u003e[ 231.444052] #PF: supervisor read access in kernel mode\n\u003c1\u003e[ 231.444484] #PF: error_code(0x0000) - not-present page\n\u003c6\u003e[ 231.444913] PGD 0 P4D 0\n\u003c4\u003e[ 231.445342] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003c4\u003e[ 231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170\n\u003c4\u003e[ 231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b \u003c48\u003e 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89\n\u003c4\u003e[ 231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202\n\u003c4\u003e[ 231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010\n\u003c4\u003e[ 231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000\n\u003c4\u003e[ 231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000\n\u003c4\u003e[ 231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n\u003c4\u003e[ 231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000\n\u003c4\u003e[ 231.450265] FS: 00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000\n\u003c4\u003e[ 231.450715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003c4\u003e[ 231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0\n\u003c4\u003e[ 231.451629] PKRU: 55555554\n\u003c4\u003e[ 231.452076] Call Trace:\n\u003c4\u003e[ 231.452549] \u003cTASK\u003e\n\u003c4\u003e[ 231.452996] ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]\n\u003c4\u003e[ 231.453482] ice_resume+0xfd/0x220 [ice]\n\u003c4\u003e[ 231.453977] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.454425] pci_pm_resume+0x8c/0x140\n\u003c4\u003e[ 231.454872] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.455347] dpm_run_callback+0x5f/0x160\n\u003c4\u003e[ 231.455796] ? dpm_wait_for_superior+0x107/0x170\n\u003c4\u003e[ 231.456244] device_resume+0x177/0x270\n\u003c4\u003e[ 231.456708] dpm_resume+0x209/0x2f0\n\u003c4\u003e[ 231.457151] dpm_resume_end+0x15/0x30\n\u003c4\u003e[ 231.457596] suspend_devices_and_enter+0x1da/0x2b0\n\u003c4\u003e[ 231.458054] enter_state+0x10e/0x570\n\nAdd defensive checks for both the ring pointer and its q_vector\nbefore dereferencing, allowing the system to resume successfully even when\nq_vectors are unmapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23166",
"url": "https://www.suse.com/security/cve/CVE-2026-23166"
},
{
"category": "external",
"summary": "SUSE Bug 1258272 for CVE-2026-23166",
"url": "https://bugzilla.suse.com/1258272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix race between rfkill and nci_unregister_device().\n\nsyzbot reported the splat below [0] without a repro.\n\nIt indicates that struct nci_dev.cmd_wq had been destroyed before\nnci_close_device() was called via rfkill.\n\nnci_dev.cmd_wq is only destroyed in nci_unregister_device(), which\n(I think) was called from virtual_ncidev_close() when syzbot close()d\nan fd of virtual_ncidev.\n\nThe problem is that nci_unregister_device() destroys nci_dev.cmd_wq\nfirst and then calls nfc_unregister_device(), which removes the\ndevice from rfkill by rfkill_unregister().\n\nSo, the device is still visible via rfkill even after nci_dev.cmd_wq\nis destroyed.\n\nLet\u0027s unregister the device from rfkill first in nci_unregister_device().\n\nNote that we cannot call nfc_unregister_device() before\nnci_close_device() because\n\n 1) nfc_unregister_device() calls device_del() which frees\n all memory allocated by devm_kzalloc() and linked to\n ndev-\u003econn_info_list\n\n 2) nci_rx_work() could try to queue nci_conn_info to\n ndev-\u003econn_info_list which could be leaked\n\nThus, nfc_unregister_device() is split into two functions so we\ncan remove rfkill interfaces only before nci_close_device().\n\n[0]:\nDEBUG_LOCKS_WARN_ON(1)\nWARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349\nModules linked in:\nCPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026\nRIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]\nRIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]\nRIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187\nCode: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d \u003c67\u003e 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f\nRSP: 0018:ffffc9000c767680 EFLAGS: 00010046\nRAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000\nRDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0\nRBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4\nR10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2\nR13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30\nFS: 00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868\n touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940\n __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982\n nci_close_device+0x302/0x630 net/nfc/nci/core.c:567\n nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639\n nfc_dev_down+0x152/0x290 net/nfc/core.c:161\n nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179\n rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346\n rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301\n vfs_write+0x29a/0xb90 fs/read_write.c:684\n ksys_write+0x150/0x270 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa59b39acb9\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9\nRDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007\nRBP: 00007fa59b408bf7 R08: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23167",
"url": "https://www.suse.com/security/cve/CVE-2026-23167"
},
{
"category": "external",
"summary": "SUSE Bug 1258374 for CVE-2026-23167",
"url": "https://bugzilla.suse.com/1258374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix race in mptcp_pm_nl_flush_addrs_doit()\n\nsyzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()\nand/or mptcp_pm_nl_is_backup()\n\nRoot cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()\nwhich is not RCU ready.\n\nlist_splice_init_rcu() can not be called here while holding pernet-\u003elock\nspinlock.\n\nMany thanks to Eulgyu Kim for providing a repro and testing our patches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23169",
"url": "https://www.suse.com/security/cve/CVE-2026-23169"
},
{
"category": "external",
"summary": "SUSE Bug 1258389 for CVE-2026-23169",
"url": "https://bugzilla.suse.com/1258389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imx/tve: fix probe device leak\n\nMake sure to drop the reference taken to the DDC device during probe on\nprobe failure (e.g. probe deferral) and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23170",
"url": "https://www.suse.com/security/cve/CVE-2026-23170"
},
{
"category": "external",
"summary": "SUSE Bug 1258379 for CVE-2026-23170",
"url": "https://bugzilla.suse.com/1258379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix use-after-free due to enslave fail after slave array update\n\nFix a use-after-free which happens due to enslave failure after the new\nslave has been added to the array. Since the new slave can be used for Tx\nimmediately, we can use it after it has been freed by the enslave error\ncleanup path which frees the allocated slave memory. Slave update array is\nsupposed to be called last when further enslave failures are not expected.\nMove it after xdp setup to avoid any problems.\n\nIt is very easy to reproduce the problem with a simple xdp_pass prog:\n ip l add bond1 type bond mode balance-xor\n ip l set bond1 up\n ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass\n ip l add dumdum type dummy\n\nThen run in parallel:\n while :; do ip l set dumdum master bond1 1\u003e/dev/null 2\u003e\u00261; done;\n mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp \"dp=1-1023, flags=syn\"\n\nThe crash happens almost immediately:\n [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI\n [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]\n [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary)\n [ 605.602979] Tainted: [B]=BAD_PAGE\n [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210\n [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89\n [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213\n [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000\n [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be\n [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c\n [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000\n [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84\n [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000\n [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0\n [ 605.603373] Call Trace:\n [ 605.603392] \u003cTASK\u003e\n [ 605.603410] __dev_queue_xmit+0x448/0x32a0\n [ 605.603434] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603461] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603484] ? __pfx___dev_queue_xmit+0x10/0x10\n [ 605.603507] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603546] ? _printk+0xcb/0x100\n [ 605.603566] ? __pfx__printk+0x10/0x10\n [ 605.603589] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603627] ? add_taint+0x5e/0x70\n [ 605.603648] ? add_taint+0x2a/0x70\n [ 605.603670] ? end_report.cold+0x51/0x75\n [ 605.603693] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603731] bond_start_xmit+0x623/0xc20 [bonding]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23171",
"url": "https://www.suse.com/security/cve/CVE-2026-23171"
},
{
"category": "external",
"summary": "SUSE Bug 1258349 for CVE-2026-23171",
"url": "https://bugzilla.suse.com/1258349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path\n\nWhen receiving data in the DPMAIF RX path,\nthe t7xx_dpmaif_set_frag_to_skb() function adds\npage fragments to an skb without checking if the number of\nfragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow\nin skb_shinfo(skb)-\u003efrags[] array, corrupting adjacent memory and\npotentially causing kernel crashes or other undefined behavior.\n\nThis issue was identified through static code analysis by comparing with a\nsimilar vulnerability fixed in the mt76 driver commit b102f0c522cf (\"mt76:\nfix array overflow on receiving too many fragments for a packet\").\n\nThe vulnerability could be triggered if the modem firmware sends packets\nwith excessive fragments. While under normal protocol conditions (MTU 3080\nbytes, BAT buffer 3584 bytes),\na single packet should not require additional\nfragments, the kernel should not blindly trust firmware behavior.\nMalicious, buggy, or compromised firmware could potentially craft packets\nwith more fragments than the kernel expects.\n\nFix this by adding a bounds check before calling skb_add_rx_frag() to\nensure nr_frags does not exceed MAX_SKB_FRAGS.\n\nThe check must be performed before unmapping to avoid a page leak\nand double DMA unmap during device teardown.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23172",
"url": "https://www.suse.com/security/cve/CVE-2026-23172"
},
{
"category": "external",
"summary": "SUSE Bug 1258519 for CVE-2026-23172",
"url": "https://bugzilla.suse.com/1258519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: TC, delete flows only for existing peers\n\nWhen deleting TC steering flows, iterate only over actual devcom\npeers instead of assuming all possible ports exist. This avoids\ntouching non-existent peers and ensures cleanup is limited to\ndevices the driver is currently connected to.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000008\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 133c8a067 P4D 0\n Oops: Oops: 0002 [#1] SMP\n CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]\n Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff \u003c48\u003e 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49\n RSP: 0018:ff11000143867528 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000\n RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0\n RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002\n R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78\n R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0\n FS: 00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0\n Call Trace:\n \u003cTASK\u003e\n mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]\n mlx5e_flow_put+0x25/0x50 [mlx5_core]\n mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]\n tc_setup_cb_reoffload+0x20/0x80\n fl_reoffload+0x26f/0x2f0 [cls_flower]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n tcf_block_playback_offloads+0x9e/0x1c0\n tcf_block_unbind+0x7b/0xd0\n tcf_block_setup+0x186/0x1d0\n tcf_block_offload_cmd.isra.0+0xef/0x130\n tcf_block_offload_unbind+0x43/0x70\n __tcf_block_put+0x85/0x160\n ingress_destroy+0x32/0x110 [sch_ingress]\n __qdisc_destroy+0x44/0x100\n qdisc_graft+0x22b/0x610\n tc_get_qdisc+0x183/0x4d0\n rtnetlink_rcv_msg+0x2d7/0x3d0\n ? rtnl_calcit.isra.0+0x100/0x100\n netlink_rcv_skb+0x53/0x100\n netlink_unicast+0x249/0x320\n ? __alloc_skb+0x102/0x1f0\n netlink_sendmsg+0x1e3/0x420\n __sock_sendmsg+0x38/0x60\n ____sys_sendmsg+0x1ef/0x230\n ? copy_msghdr_from_user+0x6c/0xa0\n ___sys_sendmsg+0x7f/0xc0\n ? ___sys_recvmsg+0x8a/0xc0\n ? __sys_sendto+0x119/0x180\n __sys_sendmsg+0x61/0xb0\n do_syscall_64+0x55/0x640\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f35238bb764\n Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55\n RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764\n RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003\n RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20\n R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790\n R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23173",
"url": "https://www.suse.com/security/cve/CVE-2026-23173"
},
{
"category": "external",
"summary": "SUSE Bug 1258520 for CVE-2026-23173",
"url": "https://bugzilla.suse.com/1258520"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_haps: Fix memory leaks in add/remove routines\n\ntoshiba_haps_add() leaks the haps object allocated by it if it returns\nan error after allocating that object successfully.\n\ntoshiba_haps_remove() does not free the object pointed to by\ntoshiba_haps before clearing that pointer, so it becomes unreachable\nallocated memory.\n\nAddress these memory leaks by using devm_kzalloc() for allocating\nthe memory in question.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23176",
"url": "https://www.suse.com/security/cve/CVE-2026-23176"
},
{
"category": "external",
"summary": "SUSE Bug 1258256 for CVE-2026-23176",
"url": "https://bugzilla.suse.com/1258256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, shmem: prevent infinite loop on truncate race\n\nWhen truncating a large swap entry, shmem_free_swap() returns 0 when the\nentry\u0027s index doesn\u0027t match the given index due to lookup alignment. The\nfailure fallback path checks if the entry crosses the end border and\naborts when it happens, so truncate won\u0027t erase an unexpected entry or\nrange. But one scenario was ignored.\n\nWhen `index` points to the middle of a large swap entry, and the large\nswap entry doesn\u0027t go across the end border, find_get_entries() will\nreturn that large swap entry as the first item in the batch with\n`indices[0]` equal to `index`. The entry\u0027s base index will be smaller\nthan `indices[0]`, so shmem_free_swap() will fail and return 0 due to the\n\"base \u003c index\" check. The code will then call shmem_confirm_swap(), get\nthe order, check if it crosses the END boundary (which it doesn\u0027t), and\nretry with the same index.\n\nThe next iteration will find the same entry again at the same index with\nsame indices, leading to an infinite loop.\n\nFix this by retrying with a round-down index, and abort if the index is\nsmaller than the truncate range.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23177",
"url": "https://www.suse.com/security/cve/CVE-2026-23177"
},
{
"category": "external",
"summary": "SUSE Bug 1258324 for CVE-2026-23177",
"url": "https://bugzilla.suse.com/1258324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23177"
},
{
"cve": "CVE-2026-23178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()\n\n`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data\ninto `ihid-\u003erawbuf`.\n\nThe former can come from the userspace in the hidraw driver and is only\nbounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set\n`max_buffer_size` field of `struct hid_ll_driver` which we do not).\n\nThe latter has size determined at runtime by the maximum size of\ndifferent report types you could receive on any particular device and\ncan be a much smaller value.\n\nFix this by truncating `recv_len` to `ihid-\u003ebufsize - sizeof(__le16)`.\n\nThe impact is low since access to hidraw devices requires root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23178",
"url": "https://www.suse.com/security/cve/CVE-2026-23178"
},
{
"category": "external",
"summary": "SUSE Bug 1258358 for CVE-2026-23178",
"url": "https://bugzilla.suse.com/1258358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()\n\nWhen the socket is closed while in TCP_LISTEN a callback is run to\nflush all outstanding packets, which in turns calls\nnvmet_tcp_listen_data_ready() with the sk_callback_lock held.\nSo we need to check if we are in TCP_LISTEN before attempting\nto get the sk_callback_lock() to avoid a deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23179",
"url": "https://www.suse.com/security/cve/CVE-2026-23179"
},
{
"category": "external",
"summary": "SUSE Bug 1258394 for CVE-2026-23179",
"url": "https://bugzilla.suse.com/1258394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra: Fix a memory leak in tegra_slink_probe()\n\nIn tegra_slink_probe(), when platform_get_irq() fails, it directly\nreturns from the function with an error code, which causes a memory leak.\n\nReplace it with a goto label to ensure proper cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23182",
"url": "https://www.suse.com/security/cve/CVE-2026-23182"
},
{
"category": "external",
"summary": "SUSE Bug 1258259 for CVE-2026-23182",
"url": "https://bugzilla.suse.com/1258259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: r8152: fix resume reset deadlock\n\nrtl8152 can trigger device reset during reset which\npotentially can result in a deadlock:\n\n **** DPM device timeout after 10 seconds; 15 seconds until panic ****\n Call Trace:\n \u003cTASK\u003e\n schedule+0x483/0x1370\n schedule_preempt_disabled+0x15/0x30\n __mutex_lock_common+0x1fd/0x470\n __rtl8152_set_mac_address+0x80/0x1f0\n dev_set_mac_address+0x7f/0x150\n rtl8152_post_reset+0x72/0x150\n usb_reset_device+0x1d0/0x220\n rtl8152_resume+0x99/0xc0\n usb_resume_interface+0x3e/0xc0\n usb_resume_both+0x104/0x150\n usb_resume+0x22/0x110\n\nThe problem is that rtl8152 resume calls reset under\ntp-\u003econtrol mutex while reset basically re-enters rtl8152\nand attempts to acquire the same tp-\u003econtrol lock once\nagain.\n\nReset INACCESSIBLE device outside of tp-\u003econtrol mutex\nscope to avoid recursive mutex_lock() deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23188",
"url": "https://www.suse.com/security/cve/CVE-2026-23188"
},
{
"category": "external",
"summary": "SUSE Bug 1258331 for CVE-2026-23188",
"url": "https://bugzilla.suse.com/1258331"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23188"
},
{
"cve": "CVE-2026-23189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix NULL pointer dereference in ceph_mds_auth_match()\n\nThe CephFS kernel client has regression starting from 6.18-rc1.\nWe have issue in ceph_mds_auth_match() if fs_name == NULL:\n\n const char fs_name = mdsc-\u003efsc-\u003emount_options-\u003emds_namespace;\n ...\n if (auth-\u003ematch.fs_name \u0026\u0026 strcmp(auth-\u003ematch.fs_name, fs_name)) {\n / fsname mismatch, try next one */\n return 0;\n }\n\nPatrick Donnelly suggested that: In summary, we should definitely start\ndecoding `fs_name` from the MDSMap and do strict authorizations checks\nagainst it. Note that the `-o mds_namespace=foo` should only be used for\nselecting the file system to mount and nothing else. It\u0027s possible\nno mds_namespace is specified but the kernel will mount the only\nfile system that exists which may have name \"foo\".\n\nThis patch reworks ceph_mdsmap_decode() and namespace_equals() with\nthe goal of supporting the suggested concept. Now struct ceph_mdsmap\ncontains m_fs_name field that receives copy of extracted FS name\nby ceph_extract_encoded_string(). For the case of \"old\" CephFS file\nsystems, it is used \"cephfs\" name.\n\n[ idryomov: replace redundant %*pE with %s in ceph_mdsmap_decode(),\n get rid of a series of strlen() calls in ceph_namespace_match(),\n drop changes to namespace_equals() body to avoid treating empty\n mds_namespace as equal, drop changes to ceph_mdsc_handle_fsmap()\n as namespace_equals() isn\u0027t an equivalent substitution there ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23189",
"url": "https://www.suse.com/security/cve/CVE-2026-23189"
},
{
"category": "external",
"summary": "SUSE Bug 1258308 for CVE-2026-23189",
"url": "https://bugzilla.suse.com/1258308"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23189"
},
{
"cve": "CVE-2026-23190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: fix memory leak in acp3x pdm dma ops",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23190",
"url": "https://www.suse.com/security/cve/CVE-2026-23190"
},
{
"category": "external",
"summary": "SUSE Bug 1258397 for CVE-2026-23190",
"url": "https://bugzilla.suse.com/1258397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n cable-\u003elock spinlock, and add the proper NULL checks. This avoids\n already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n that may be stopped in this function, which was the major pain point\n leading to UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23191",
"url": "https://www.suse.com/security/cve/CVE-2026-23191"
},
{
"category": "external",
"summary": "SUSE Bug 1258395 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "external",
"summary": "SUSE Bug 1258396 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Don\u0027t clobber irqfd routing type when deassigning irqfd\n\nWhen deassigning a KVM_IRQFD, don\u0027t clobber the irqfd\u0027s copy of the IRQ\u0027s\nrouting entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86\nand arm64, which explicitly look for KVM_IRQ_ROUTING_MSI. Instead, to\nhandle a concurrent routing update, verify that the irqfd is still active\nbefore consuming the routing information. As evidenced by the x86 and\narm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),\nclobbering the entry type without notifying arch code is surprising and\nerror prone.\n\nAs a bonus, checking that the irqfd is active provides a convenient\nlocation for documenting _why_ KVM must not consume the routing entry for\nan irqfd that is in the process of being deassigned: once the irqfd is\ndeleted from the list (which happens *before* the eventfd is detached), it\nwill no longer receive updates via kvm_irq_routing_update(), and so KVM\ncould deliver an event using stale routing information (relative to\nKVM_SET_GSI_ROUTING returning to userspace).\n\nAs an even better bonus, explicitly checking for the irqfd being active\nfixes a similar bug to the one the clobbering is trying to prevent: if an\nirqfd is deactivated, and then its routing is changed,\nkvm_irq_routing_update() won\u0027t invoke kvm_arch_update_irqfd_routing()\n(because the irqfd isn\u0027t in the list). And so if the irqfd is in bypass\nmode, IRQs will continue to be posted using the old routing information.\n\nAs for kvm_arch_irq_bypass_del_producer(), clobbering the routing type\nresults in KVM incorrectly keeping the IRQ in bypass mode, which is\nespecially problematic on AMD as KVM tracks IRQs that are being posted to\na vCPU in a list whose lifetime is tied to the irqfd.\n\nWithout the help of KASAN to detect use-after-free, the most common\nsympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to\nthe memory for irqfd structure being re-allocated and zeroed, resulting\nin irqfd-\u003eirq_bypass_data being NULL when read by\navic_update_iommu_vcpu_affinity():\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0\n Oops: Oops: 0000 [#1] SMP\n CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--5dddc257e6b2-irqfd #31 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:amd_iommu_update_ga+0x19/0xe0\n Call Trace:\n \u003cTASK\u003e\n avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]\n __avic_vcpu_load+0xf4/0x130 [kvm_amd]\n kvm_arch_vcpu_load+0x89/0x210 [kvm]\n vcpu_load+0x30/0x40 [kvm]\n kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]\n kvm_vcpu_ioctl+0x571/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x6f/0x9d0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x46893b\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIf AVIC is inhibited when the irfd is deassigned, the bug will manifest as\nlist corruption, e.g. on the next irqfd assignment.\n\n list_add corruption. next-\u003eprev should be prev (ffff8d474d5cd588),\n but was 0000000000000000. (next=ffff8d8658f86530).\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:31!\n Oops: invalid opcode: 0000 [#1] SMP\n CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--f19dc4d680ba-irqfd #28 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:__list_add_valid_or_report+0x97/0xc0\n Call Trace:\n \u003cTASK\u003e\n avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]\n kvm_pi_update_irte+0xbf/0x190 [kvm]\n kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]\n irq_bypass_register_consumer+0xcd/0x170 [irqbypa\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23198",
"url": "https://www.suse.com/security/cve/CVE-2026-23198"
},
{
"category": "external",
"summary": "SUSE Bug 1258321 for CVE-2026-23198",
"url": "https://bugzilla.suse.com/1258321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Prevent excessive number of frames\n\nIn this case, the user constructed the parameters with maxpacksize 40\nfor rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer\nsize for each data URB is maxpacksize * packets, which in this example\nis 40 * 6 = 240; When the user performs a write operation to send audio\ndata into the ALSA PCM playback stream, the calculated number of frames\nis packsize[0] * packets = 264, which exceeds the allocated URB buffer\nsize, triggering the out-of-bounds (OOB) issue reported by syzbot [1].\n\nAdded a check for the number of single data URB frames when calculating\nthe number of frames to prevent [1].\n\n[1]\nBUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\nWrite of size 264 at addr ffff88804337e800 by task syz.0.17/5506\nCall Trace:\n copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\n prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611\n prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23208",
"url": "https://www.suse.com/security/cve/CVE-2026-23208"
},
{
"category": "external",
"summary": "SUSE Bug 1258468 for CVE-2026-23208",
"url": "https://bugzilla.suse.com/1258468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n\u003cquote valis\u003e\n\nThe issue is triggered when a new macvlan link is created with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port\u0027s vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n if (ops-\u003enewlink)\n err = ops-\u003enewlink(dev, \u0026params, extack);\n else\n err = register_netdevice(dev);\n if (err \u003c 0) {\n free_netdev(dev);\n goto out;\n }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device\u0027s macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n\u003c/quote valis\u003e\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23209",
"url": "https://www.suse.com/security/cve/CVE-2026-23209"
},
{
"category": "external",
"summary": "SUSE Bug 1258518 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "external",
"summary": "SUSE Bug 1258784 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23210"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix PTP NULL pointer dereference during VSI rebuild\n\nFix race condition where PTP periodic work runs while VSI is being\nrebuilt, accessing NULL vsi-\u003erx_rings.\n\nThe sequence was:\n1. ice_ptp_prepare_for_reset() cancels PTP work\n2. ice_ptp_rebuild() immediately queues PTP work\n3. VSI rebuild happens AFTER ice_ptp_rebuild()\n4. PTP work runs and accesses NULL vsi-\u003erx_rings\n\nFix: Keep PTP work cancelled during rebuild, only queue it after\nVSI rebuild completes in ice_rebuild().\n\nAdded ice_ptp_queue_work() helper function to encapsulate the logic\nfor queuing PTP work, ensuring it\u0027s only queued when PTP is supported\nand the state is ICE_PTP_READY.\n\nError log:\n[ 121.392544] ice 0000:60:00.1: PTP reset successful\n[ 121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 121.392712] #PF: supervisor read access in kernel mode\n[ 121.392720] #PF: error_code(0x0000) - not-present page\n[ 121.392727] PGD 0\n[ 121.392734] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S 6.19.0-rc6+ #4 PREEMPT(voluntary)\n[ 121.392761] Tainted: [S]=CPU_OUT_OF_SPEC\n[ 121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice]\n[ 121.393042] Call Trace:\n[ 121.393047] \u003cTASK\u003e\n[ 121.393055] ice_ptp_periodic_work+0x69/0x180 [ice]\n[ 121.393202] kthread_worker_fn+0xa2/0x260\n[ 121.393216] ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice]\n[ 121.393359] ? __pfx_kthread_worker_fn+0x10/0x10\n[ 121.393371] kthread+0x10d/0x230\n[ 121.393382] ? __pfx_kthread+0x10/0x10\n[ 121.393393] ret_from_fork+0x273/0x2b0\n[ 121.393407] ? __pfx_kthread+0x10/0x10\n[ 121.393417] ret_from_fork_asm+0x1a/0x30\n[ 121.393432] \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23210",
"url": "https://www.suse.com/security/cve/CVE-2026-23210"
},
{
"category": "external",
"summary": "SUSE Bug 1258517 for CVE-2026-23210",
"url": "https://bugzilla.suse.com/1258517"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23210"
},
{
"cve": "CVE-2026-23213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Disable MMIO access during SMU Mode 1 reset\n\nDuring Mode 1 reset, the ASIC undergoes a reset cycle and becomes\ntemporarily inaccessible via PCIe. Any attempt to access MMIO registers\nduring this window (e.g., from interrupt handlers or other driver threads)\ncan result in uncompleted PCIe transactions, leading to NMI panics or\nsystem hangs.\n\nTo prevent this, set the `no_hw_access` flag to true immediately after\ntriggering the reset. This signals other driver components to skip\nregister accesses while the device is offline.\n\nA memory barrier `smp_mb()` is added to ensure the flag update is\nglobally visible to all cores before the driver enters the sleep/wait\nstate.\n\n(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23213",
"url": "https://www.suse.com/security/cve/CVE-2026-23213"
},
{
"category": "external",
"summary": "SUSE Bug 1258465 for CVE-2026-23213",
"url": "https://bugzilla.suse.com/1258465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23213"
},
{
"cve": "CVE-2026-23214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \u003cTASK\u003e\n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e\n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23214",
"url": "https://www.suse.com/security/cve/CVE-2026-23214"
},
{
"category": "external",
"summary": "SUSE Bug 1258464 for CVE-2026-23214",
"url": "https://bugzilla.suse.com/1258464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23214"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23223"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix UAF in xchk_btree_check_block_owner\n\nWe cannot dereference bs-\u003ecur when trying to determine if bs-\u003ecur\naliases bs-\u003esc-\u003esa.{bno,rmap}_cur after the latter has been freed.\nFix this by sampling before type before any freeing could happen.\nThe correct temporal ordering was broken when we removed xfs_btnum_t.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23223",
"url": "https://www.suse.com/security/cve/CVE-2026-23223"
},
{
"category": "external",
"summary": "SUSE Bug 1258483 for CVE-2026-23223",
"url": "https://bugzilla.suse.com/1258483"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23223"
},
{
"cve": "CVE-2026-23224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix UAF issue for file-backed mounts w/ directio option\n\n[ 9.269940][ T3222] Call trace:\n[ 9.269948][ T3222] ext4_file_read_iter+0xac/0x108\n[ 9.269979][ T3222] vfs_iocb_iter_read+0xac/0x198\n[ 9.269993][ T3222] erofs_fileio_rq_submit+0x12c/0x180\n[ 9.270008][ T3222] erofs_fileio_submit_bio+0x14/0x24\n[ 9.270030][ T3222] z_erofs_runqueue+0x834/0x8ac\n[ 9.270054][ T3222] z_erofs_read_folio+0x120/0x220\n[ 9.270083][ T3222] filemap_read_folio+0x60/0x120\n[ 9.270102][ T3222] filemap_fault+0xcac/0x1060\n[ 9.270119][ T3222] do_pte_missing+0x2d8/0x1554\n[ 9.270131][ T3222] handle_mm_fault+0x5ec/0x70c\n[ 9.270142][ T3222] do_page_fault+0x178/0x88c\n[ 9.270167][ T3222] do_translation_fault+0x38/0x54\n[ 9.270183][ T3222] do_mem_abort+0x54/0xac\n[ 9.270208][ T3222] el0_da+0x44/0x7c\n[ 9.270227][ T3222] el0t_64_sync_handler+0x5c/0xf4\n[ 9.270253][ T3222] el0t_64_sync+0x1bc/0x1c0\n\nEROFS may encounter above panic when enabling file-backed mount w/\ndirectio mount option, the root cause is it may suffer UAF in below\nrace condition:\n\n- z_erofs_read_folio wq s_dio_done_wq\n - z_erofs_runqueue\n - erofs_fileio_submit_bio\n - erofs_fileio_rq_submit\n - vfs_iocb_iter_read\n - ext4_file_read_iter\n - ext4_dio_read_iter\n - iomap_dio_rw\n : bio was submitted and return -EIOCBQUEUED\n - dio_aio_complete_work\n - dio_complete\n - dio-\u003eiocb-\u003eki_complete (erofs_fileio_ki_complete())\n - kfree(rq)\n : it frees iocb, iocb.ki_filp can be UAF in file_accessed().\n - file_accessed\n : access NULL file point\n\nIntroduce a reference count in struct erofs_fileio_rq, and initialize it\nas two, both erofs_fileio_ki_complete() and erofs_fileio_rq_submit() will\ndecrease reference count, the last one decreasing the reference count\nto zero will free rq.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23224",
"url": "https://www.suse.com/security/cve/CVE-2026-23224"
},
{
"category": "external",
"summary": "SUSE Bug 1258461 for CVE-2026-23224",
"url": "https://bugzilla.suse.com/1258461"
},
{
"category": "external",
"summary": "SUSE Bug 1258463 for CVE-2026-23224",
"url": "https://bugzilla.suse.com/1258463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "important"
}
],
"title": "CVE-2026-23224"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
},
{
"cve": "CVE-2026-23230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: split cached_fid bitfields to avoid shared-byte RMW races\n\nis_open, has_lease and on_list are stored in the same bitfield byte in\nstruct cached_fid but are updated in different code paths that may run\nconcurrently. Bitfield assignments generate byte read-modify-write\noperations (e.g. `orb $mask, addr` on x86_64), so updating one flag can\nrestore stale values of the others.\n\nA possible interleaving is:\n CPU1: load old byte (has_lease=1, on_list=1)\n CPU2: clear both flags (store 0)\n CPU1: RMW store (old | IS_OPEN) -\u003e reintroduces cleared bits\n\nTo avoid this class of races, convert these flags to separate bool\nfields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23230",
"url": "https://www.suse.com/security/cve/CVE-2026-23230"
},
{
"category": "external",
"summary": "SUSE Bug 1258430 for CVE-2026-23230",
"url": "https://bugzilla.suse.com/1258430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.27.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.27.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.27.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T08:48:43Z",
"details": "moderate"
}
],
"title": "CVE-2026-23230"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…